CVE-2025-38506
BaseFortify
Publication date: 2025-08-16
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's KVM module when running an SEV-SNP guest with a very large amount of memory (1TB or more). During an operation to set memory attributes across the entire guest memory range, the host CPU can experience soft lockups, meaning the CPU gets stuck for an extended period (e.g., 26 seconds). This happens in the function kvm_vm_set_mem_attributes(). The fix involves calling cond_resched() during the memory attribute setting loop to allow the scheduler to run higher priority tasks and prevent the CPU from being stuck in kernel mode for too long.
How can this vulnerability impact me? :
This vulnerability can cause the host system's CPU to experience soft lockups when managing large SEV-SNP guest memory, leading to degraded system responsiveness or temporary hangs. This can impact the stability and performance of virtualized environments running large memory guests, potentially affecting workloads and services hosted on the affected system.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for CPU soft lockups on the host running SEV-SNP guests with large memory allocations (1TB+). Look for kernel messages or logs indicating 'soft lockup' errors related to qemu-kvm processes. Commands such as 'dmesg | grep -i "soft lockup"' or 'journalctl -k | grep -i "soft lockup"' can help identify these symptoms.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the issue is resolved. The fix involves calling cond_resched() during the memory attribute setting loop to prevent CPU soft lockups. Until the update is applied, avoid running SEV-SNP guests with very large memory allocations (1TB+) that trigger the issue.