CVE-2025-38696
BaseFortify
Publication date: 2025-09-04
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel on MIPS architecture where the function stack_top() can cause a crash if called by tasks that do not have an ABI (Application Binary Interface) associated or a vDSO (virtual Dynamic Shared Object) mapped. Specifically, tasks like kernel threads (kthreads) never have an ABI, and if such a task calls stack_top(), the function dereferences a NULL ABI pointer, leading to a kernel crash. The fix involves only dereferencing the ABI pointer if it is set, preventing the crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when certain tasks without an ABI or vDSO mapped call the stack_top() function. This can lead to system instability or denial of service due to kernel crashes, especially in environments using kernel unit testing (kunit) or involving kernel threads.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by ensuring that the ABI pointer is only dereferenced if it is set, preventing crashes in stack_top() for tasks without ABI or vDSO. Immediate mitigation involves updating the Linux kernel to the fixed version that includes this patch.