CVE-2025-38493
BaseFortify
Publication date: 2025-07-28
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-674 | The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a kernel panic caused by a buffer overflow in the Linux kernel's tracing subsystem, specifically in the timerlat_dump_stack() function. The issue arises because the size field of a stack entry structure is not properly set before a memcpy operation, leading to an out-of-bounds write and subsequent kernel crash when using timerlat with stack saving.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel panic) when using the timerlat tool with stack saving enabled. This can lead to system instability, unexpected reboots, and potential loss of data or service availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel panics related to timerlat with stack saving enabled. Specifically, look for dmesg output containing messages like 'memcpy: detected buffer overflow' and warnings referencing __fortify_report and timerlat_dump_stack. You can check the kernel logs using the command: dmesg | grep -i timerlat. Additionally, monitoring for kernel panics or crashes when running timerlat tools may indicate the presence of this issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where this vulnerability is fixed (post commit e7186af7fb26). Avoid using timerlat with stack saving enabled until the patch is applied. Monitoring kernel logs for related errors and avoiding triggering the vulnerable code path can help reduce risk until the update is performed.