CVE-2025-39813
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153-1 |
| linux | linux_kernel | 5.10.244-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's ftrace subsystem. When ftrace_dump_one() is called concurrently with reading from trace_pipe, a WARN_ON_ONCE() warning can be triggered in trace_printk_seq() due to the ring buffer data being consumed by other readers between certain function calls. This causes trace_find_next_entry_inc() to return NULL and leaves iter.seq.len and iter.seq.size both set to 0, triggering the warning. The fix involves moving the call to trace_printk_seq() inside a conditional block that ensures iter.seq is properly populated before use.
How can this vulnerability impact me? :
This vulnerability can cause a warning (WARN_ON_ONCE) to be triggered in the kernel, which may indicate instability or unexpected behavior in the ftrace subsystem during concurrent tracing operations. While it does not describe a direct security breach or data loss, such warnings can lead to kernel log clutter, potential performance issues, or debugging difficulties.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the kernel logs for WARN_ON_ONCE() warnings related to trace_printk_seq during concurrent access to ftrace_dump and trace_pipe. You can check the kernel log using commands like 'dmesg | grep WARN' or 'journalctl -k | grep WARN' to identify such warnings.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the fix has been applied. The fix involves moving the trace_printk_seq() call inside the conditional block that ensures the trace_find_next_entry_inc() returns non-NULL, preventing the WARN_ON_ONCE() from triggering due to the race condition.