CVE-2025-38089
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
30/06/2025
Last modified:
19/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
sunrpc: handle SVC_GARBAGE during svc auth processing as auth error<br />
<br />
tianshuo han reported a remotely-triggerable crash if the client sends a<br />
kernel RPC server a specially crafted packet. If decoding the RPC reply<br />
fails in such a way that SVC_GARBAGE is returned without setting the<br />
rq_accept_statp pointer, then that pointer can be dereferenced and a<br />
value stored there.<br />
<br />
If it&#39;s the first time the thread has processed an RPC, then that<br />
pointer will be set to NULL and the kernel will crash. In other cases,<br />
it could create a memory scribble.<br />
<br />
The server sunrpc code treats a SVC_GARBAGE return from svc_authenticate<br />
or pg_authenticate as if it should send a GARBAGE_ARGS reply. RFC 5531<br />
says that if authentication fails that the RPC should be rejected<br />
instead with a status of AUTH_ERR.<br />
<br />
Handle a SVC_GARBAGE return as an AUTH_ERROR, with a reason of<br />
AUTH_BADCRED instead of returning GARBAGE_ARGS in that case. This<br />
sidesteps the whole problem of touching the rpc_accept_statp pointer in<br />
this situation and avoids the crash.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.3.4 (including) | 6.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.4.1 (including) | 6.6.95 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.35 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.4:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.4:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.4:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.4:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/353e75b55e583635bf71cde6abcec274dba05edd
- https://git.kernel.org/stable/c/599c489eea793821232a2f69a00fa57d82b0ac98
- https://git.kernel.org/stable/c/94d10a4dba0bc482f2b01e39f06d5513d0f75742
- https://git.kernel.org/stable/c/c90459cd58bb421d275337093d8e901e0ba748dd
- https://github.com/keymaker-arch/NFSundown
- https://www.openwall.com/lists/oss-security/2025/07/02/2
- http://www.openwall.com/lists/oss-security/2025/07/02/2



