CVE-2025-38089
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/06/2025
Last modified:
03/07/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
sunrpc: handle SVC_GARBAGE during svc auth processing as auth error<br />
<br />
tianshuo han reported a remotely-triggerable crash if the client sends a<br />
kernel RPC server a specially crafted packet. If decoding the RPC reply<br />
fails in such a way that SVC_GARBAGE is returned without setting the<br />
rq_accept_statp pointer, then that pointer can be dereferenced and a<br />
value stored there.<br />
<br />
If it&#39;s the first time the thread has processed an RPC, then that<br />
pointer will be set to NULL and the kernel will crash. In other cases,<br />
it could create a memory scribble.<br />
<br />
The server sunrpc code treats a SVC_GARBAGE return from svc_authenticate<br />
or pg_authenticate as if it should send a GARBAGE_ARGS reply. RFC 5531<br />
says that if authentication fails that the RPC should be rejected<br />
instead with a status of AUTH_ERR.<br />
<br />
Handle a SVC_GARBAGE return as an AUTH_ERROR, with a reason of<br />
AUTH_BADCRED instead of returning GARBAGE_ARGS in that case. This<br />
sidesteps the whole problem of touching the rpc_accept_statp pointer in<br />
this situation and avoids the crash.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/353e75b55e583635bf71cde6abcec274dba05edd
- https://git.kernel.org/stable/c/599c489eea793821232a2f69a00fa57d82b0ac98
- https://git.kernel.org/stable/c/94d10a4dba0bc482f2b01e39f06d5513d0f75742
- https://git.kernel.org/stable/c/c90459cd58bb421d275337093d8e901e0ba748dd
- https://github.com/keymaker-arch/NFSundown
- https://www.openwall.com/lists/oss-security/2025/07/02/2