CVE-2025-38670
BaseFortify
Publication date: 2025-08-22
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel on arm64 architectures involving the functions cpu_switch_to() and call_on_irq_stack(). These functions switch between different stacks and the Shadow Call Stack (SCS). Because these stack switches are not atomic and can be interrupted by SErrors or Debug Exceptions, it can lead to mismatched stacks and corrupted SCS pointers. This causes tasks to return to incorrect addresses or the IRQ SCS, potentially triggering kernel panics. The issue is more likely when CONFIG_ARM64_PSEUDO_NMI is enabled, allowing frequent pseudo-NMIs that can interrupt these functions and cause unpredictable kernel panics.
How can this vulnerability impact me? :
This vulnerability can cause kernel panics due to corrupted stack pointers and mismatched Shadow Call Stacks. This can lead to system instability, crashes, and unpredictable behavior on affected arm64 Linux systems, especially if CONFIG_ARM64_PSEUDO_NMI is enabled. Such panics can disrupt normal operation and potentially cause data loss or service downtime.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where DAIF masking in cpu_switch_to() and call_on_irq_stack() has been fixed as described. This involves ensuring that DAIF is completely masked during these functions to prevent interrupts that cause stack mismatches and kernel panics. Additionally, verify that CONFIG_ARM64_PSEUDO_NMI and CONFIG_SHADOW_CALL_STACK configurations are properly handled according to the fix. If updating is not immediately possible, consider disabling CONFIG_ARM64_PSEUDO_NMI to reduce the risk of frequent pseudo-NMIs causing the issue.