CVE-2025-38636

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
22/08/2025
Last modified:
26/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> rv: Use strings in da monitors tracepoints<br /> <br /> Using DA monitors tracepoints with KASAN enabled triggers the following<br /> warning:<br /> <br /> BUG: KASAN: global-out-of-bounds in do_trace_event_raw_event_event_da_monitor+0xd6/0x1a0<br /> Read of size 32 at addr ffffffffaada8980 by task ...<br /> Call Trace:<br /> <br /> [...]<br /> do_trace_event_raw_event_event_da_monitor+0xd6/0x1a0<br /> ? __pfx_do_trace_event_raw_event_event_da_monitor+0x10/0x10<br /> ? trace_event_sncid+0x83/0x200<br /> trace_event_sncid+0x163/0x200<br /> [...]<br /> The buggy address belongs to the variable:<br /> automaton_snep+0x4e0/0x5e0<br /> <br /> This is caused by the tracepoints reading 32 bytes __array instead of<br /> __string from the automata definition. Such strings are literals and<br /> reading 32 bytes ends up in out of bound memory accesses (e.g. the next<br /> automaton&amp;#39;s data in this case).<br /> The error is harmless as, while printing the string, we stop at the null<br /> terminator, but it should still be fixed.<br /> <br /> Use the __string facilities while defining the tracepoints to avoid<br /> reading out of bound memory.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.0 (including) 6.16.1 (excluding)