CVE-2025-38640
BaseFortify
Publication date: 2025-08-22
Last updated on: 2025-11-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the netfilter BPF (Berkeley Packet Filter) program being called without migration being disabled in the transmit (xmit) path. This causes an assertion failure in the __bpf_prog_run() function, leading to a kernel crash (splat). The issue arises because the code assumes a non-migratable context, but migration is not disabled, violating this assumption. The fix involves disabling migration properly by using bpf_prog_run_pin_on_cpu() in nf_hook_run_bpf().
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash unexpectedly due to an assertion failure when the netfilter BPF program is executed without migration disabled. This can lead to system instability, denial of service, and potential disruption of network operations on affected systems.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for kernel BUG messages related to migration_disabled assertions in the netfilter BPF program execution path. Specifically, look for kernel logs containing messages like 'BUG: assuming non migratable context at ./include/linux/filter.h:703' or crashes related to nf_hook_run_bpf(). You can check kernel logs using commands such as 'dmesg | grep -i bpf' or 'journalctl -k | grep -i bpf'. Additionally, monitoring for system crashes or splats involving sshd-session or other processes invoking BPF programs in the netfilter path may indicate the issue.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version where this vulnerability is fixed, which involves disabling migration in nf_hook_run_bpf() by using bpf_prog_run_pin_on_cpu(). Until the patch is applied, consider limiting or disabling the use of netfilter BPF programs in the transmission path to avoid triggering the assertion failure and kernel crash.