CVE-2025-39914
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's tracing subsystem. Specifically, when a fault is injected during the allocation of chunks in the trace_pid_list_alloc function, it causes a failure in trace_pid_list_set. This failure can lead to a double registration of the same tracepoint, which triggers a warning. The issue arises due to improper handling of allocation failures, and while it only happens when the system is about to crash, the fix involves adding failure handling logic to suppress the warning and prevent the double registration.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to emit warnings related to double registration of tracepoints, which may indicate instability or impending system crashes. Although it does not directly cause a security breach, the improper handling of allocation failures in the tracing subsystem could lead to system instability or unexpected behavior during tracing operations, especially under fault injection scenarios.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel warning messages related to tracepoint registration failures. Specifically, look for warnings like: "WARNING: CPU: ... at tracepoint_add_func..." in the kernel logs. You can check for such messages using the command: dmesg | grep tracepoint_add_func. Additionally, reproducing the warning involves echoing specific values to set_event_notrace_pid and set_event_pid files as described in the vulnerability steps, but these are more for testing than detection.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by adding failure handling logic to trace_pid_list_set to suppress the warning and prevent double registration of tracepoints. Until then, monitoring kernel logs for the warning and avoiding triggering the fault injection scenario (such as using syzkaller or similar tools) can help reduce risk.