CVE-2025-38727
BaseFortify
Publication date: 2025-09-04
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.10.240 |
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the netlink_unicast() function where a check in netlink_attachskb() for socket read memory allocation constraints is flawed. Specifically, the function does not properly handle the case when the sum of skb->truesize and sk->sk_rmem_alloc equals sk->sk_rcvbuf. This causes the function to neither accept the condition nor reschedule the task, resulting in an infinite retry loop that leads to a system stall detected by the RCU scheduler.
How can this vulnerability impact me? :
This vulnerability can cause the affected Linux system to enter an indefinite retry loop in the kernel, leading to a self-detected stall on the CPU. This can degrade system performance or cause the system to become unresponsive, impacting availability and stability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as an infinite retry loop in the netlink_unicast() function, which can cause the system to stall and produce kernel messages such as 'rcu: INFO: rcu_sched self-detected stall on CPU' and a backtrace involving netlink_attachskb and netlink_unicast. Detection can be done by monitoring kernel logs (e.g., using 'dmesg' or 'journalctl -k') for these specific stall messages and backtraces. There are no specific commands provided to detect the vulnerability directly.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by restoring the original behavior of the memory check in netlink_attachskb. Immediate mitigation involves updating the Linux kernel to a version that includes this fix. No other specific mitigation steps or workarounds are provided.