CVE-2025-38614
BaseFortify
Publication date: 2025-08-19
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's eventpoll subsystem involves insufficient checks on the depth of epoll instance graphs, allowing semi-unbounded recursion. The existing recursion depth checks do not fully limit the depth of the epoll graph because they do not consider upward paths and only check one downward path. This can lead to very deep recursion (tested to about 500 levels), which could cause issues such as stack overflows or system instability. The fix involves more thorough tracking of subtree depths and limiting the total path length between epoll nodes to a defined maximum.
How can this vulnerability impact me? :
This vulnerability can impact you by potentially causing excessive recursion depth in the Linux kernel's eventpoll subsystem, which may lead to system instability, crashes, or denial of service due to stack overflows or resource exhaustion when handling epoll instances with deeply nested graphs.