CVE-2025-38397
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a suspicious Read-Copy-Update (RCU) usage warning in the Linux kernel's NVMe multipath driver. Specifically, the issue occurs in the function nvme_mpath_add_sysfs_link(), where an RCU-list is traversed in a non-reader section, which is improper usage of RCU synchronization mechanisms. This could lead to potential kernel instability or unexpected behavior during NVMe over TCP operations.
How can this vulnerability impact me? :
The vulnerability can cause warnings related to improper RCU usage in the Linux kernel, which may lead to kernel instability or crashes when using NVMe multipath features over TCP. This could affect system reliability and performance, especially in environments relying on NVMe storage multipathing.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by monitoring your system logs for the specific 'suspicious RCU usage' warning related to nvme_mpath_add_sysfs_link(). Checking the kernel log (e.g., using 'dmesg' or 'journalctl') for messages containing 'WARNING: suspicious RCU usage' and references to 'drivers/nvme/host/multipath.c' can help identify the issue. For example, you can run the command: dmesg | grep 'suspicious RCU usage' or journalctl -k | grep 'suspicious RCU usage'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability has been fixed, as the issue is resolved in the kernel code related to nvme-multipath. Until an update is applied, monitoring for the warning and avoiding workloads that trigger the nvme-multipath functionality may reduce exposure.