CVE-2025-38727
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/09/2025
Last modified:
08/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netlink: avoid infinite retry looping in netlink_unicast()<br />
<br />
netlink_attachskb() checks for the socket&#39;s read memory allocation<br />
constraints. Firstly, it has:<br />
<br />
rmem sk_rcvbuf)<br />
<br />
to check if the just increased rmem value fits into the socket&#39;s receive<br />
buffer. If not, it proceeds and tries to wait for the memory under:<br />
<br />
rmem + skb->truesize > READ_ONCE(sk->sk_rcvbuf)<br />
<br />
The checks don&#39;t cover the case when skb->truesize + sk->sk_rmem_alloc is<br />
equal to sk->sk_rcvbuf. Thus the function neither successfully accepts<br />
these conditions, nor manages to reschedule the task - and is called in<br />
retry loop for indefinite time which is caught as:<br />
<br />
rcu: INFO: rcu_sched self-detected stall on CPU<br />
rcu: 0-....: (25999 ticks this GP) idle=ef2/1/0x4000000000000000 softirq=262269/262269 fqs=6212<br />
(t=26000 jiffies g=230833 q=259957)<br />
NMI backtrace for cpu 0<br />
CPU: 0 PID: 22 Comm: kauditd Not tainted 5.10.240 #68<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc42 04/01/2014<br />
Call Trace:<br />
<br />
dump_stack lib/dump_stack.c:120<br />
nmi_cpu_backtrace.cold lib/nmi_backtrace.c:105<br />
nmi_trigger_cpumask_backtrace lib/nmi_backtrace.c:62<br />
rcu_dump_cpu_stacks kernel/rcu/tree_stall.h:335<br />
rcu_sched_clock_irq.cold kernel/rcu/tree.c:2590<br />
update_process_times kernel/time/timer.c:1953<br />
tick_sched_handle kernel/time/tick-sched.c:227<br />
tick_sched_timer kernel/time/tick-sched.c:1399<br />
__hrtimer_run_queues kernel/time/hrtimer.c:1652<br />
hrtimer_interrupt kernel/time/hrtimer.c:1717<br />
__sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1113<br />
asm_call_irq_on_stack arch/x86/entry/entry_64.S:808<br />
<br />
<br />
netlink_attachskb net/netlink/af_netlink.c:1234<br />
netlink_unicast net/netlink/af_netlink.c:1349<br />
kauditd_send_queue kernel/audit.c:776<br />
kauditd_thread kernel/audit.c:897<br />
kthread kernel/kthread.c:328<br />
ret_from_fork arch/x86/entry/entry_64.S:304<br />
<br />
Restore the original behavior of the check which commit in Fixes<br />
accidentally missed when restructuring the code.<br />
<br />
Found by Linux Verification Center (linuxtesting.org).
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.146 (including) | 6.1.149 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.99 (including) | 6.6.103 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12.39 (including) | 6.12.43 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.15.7 (including) | 6.15.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16.1 (including) | 6.16.2 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.4.296:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.10.240:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15.189:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/346c820ef5135cf062fa3473da955ef8c5fb6929
- https://git.kernel.org/stable/c/44ddd7b1ae0b7edb2c832eb16798c827a05e58f0
- https://git.kernel.org/stable/c/47d49fd07f86d1f55ea1083287303d237e9e0922
- https://git.kernel.org/stable/c/6bee383ff83352a693d03efdf27cdd80742f71b2
- https://git.kernel.org/stable/c/759dfc7d04bab1b0b86113f1164dc1fec192b859
- https://git.kernel.org/stable/c/78fcd69d55c5f11d7694c547eca767a1cfd38ec4
- https://git.kernel.org/stable/c/d42b71a34f6b8a2d5c53df81169b03b8d8b5cf4e
- https://git.kernel.org/stable/c/e8edc7de688791a337c068693f22e8d8b869df71
- https://git.kernel.org/stable/c/f324959ad47e62e3cadaffa65d3cff790fb48529
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



