CVE-2025-38638
BaseFortify
Publication date: 2025-08-22
Last updated on: 2025-11-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel relates to the IPv6 routing notification function inet6_rt_notify(). The function is called under RCU (Read-Copy-Update) protection, which means the route data can be changed concurrently. Because of this, the helper function rt6_fill_node() may return an error (-EMSGSIZE) when the route size changes during processing. The vulnerability was addressed by adding retry logic that resizes the socket buffer (skb) and retries the operation, preventing a kernel warning (WARN_ON) that could be triggered by this race condition.
How can this vulnerability impact me? :
This vulnerability can cause kernel warnings and potentially unstable behavior in the IPv6 routing subsystem due to race conditions when routes change concurrently. While it does not explicitly mention security exploits like privilege escalation or denial of service, the kernel warnings and instability could impact system reliability and network functionality.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for the specific warning message triggered by the issue: "WARNING: CPU: ... inet6_rt_notify+0x475/0x4b0 net/ipv6/route.c:6342". You can use the following command to search for this warning in the kernel logs: sudo dmesg | grep inet6_rt_notify or sudo journalctl -k | grep inet6_rt_notify This will help identify if the vulnerability has been triggered on your system.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update the Linux kernel to a version where this issue has been resolved, as the vulnerability is fixed by adding retry logic in net6_rt_notify() in the kernel source. Until the update is applied, monitoring for the warning messages and avoiding conditions that trigger inet6_rt_notify() under RCU protection may help reduce exposure.