CVE-2025-38636
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
22/08/2025
Last modified:
26/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
rv: Use strings in da monitors tracepoints<br />
<br />
Using DA monitors tracepoints with KASAN enabled triggers the following<br />
warning:<br />
<br />
BUG: KASAN: global-out-of-bounds in do_trace_event_raw_event_event_da_monitor+0xd6/0x1a0<br />
Read of size 32 at addr ffffffffaada8980 by task ...<br />
Call Trace:<br />
<br />
[...]<br />
do_trace_event_raw_event_event_da_monitor+0xd6/0x1a0<br />
? __pfx_do_trace_event_raw_event_event_da_monitor+0x10/0x10<br />
? trace_event_sncid+0x83/0x200<br />
trace_event_sncid+0x163/0x200<br />
[...]<br />
The buggy address belongs to the variable:<br />
automaton_snep+0x4e0/0x5e0<br />
<br />
This is caused by the tracepoints reading 32 bytes __array instead of<br />
__string from the automata definition. Such strings are literals and<br />
reading 32 bytes ends up in out of bound memory accesses (e.g. the next<br />
automaton&#39;s data in this case).<br />
The error is harmless as, while printing the string, we stop at the null<br />
terminator, but it should still be fixed.<br />
<br />
Use the __string facilities while defining the tracepoints to avoid<br />
reading out of bound memory.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (including) | 6.16.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



