PT-2025-36000 · Linux · Linux Kernel

Published

2025-09-04

·

Updated

2025-09-04

·

CVE-2025-38727

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.

**Name of the Vulnerable Software and Affected Versions:**

Linux kernel versions prior to 5.10.240

**Description:**

A flaw exists in the Linux kernel's netlink subsystem, specifically within the `netlink unicast()` function. The `netlink attachskb()` function, used for socket memory allocation checks, can enter an indefinite retry loop under specific conditions where `skb->truesize + sk->sk rmem alloc` is equal to `sk->sk rcvbuf`. This can lead to a system stall, as indicated by RCU (Read-Copy Update) self-detected stall messages. The issue arises from an incomplete check during memory allocation, failing to properly handle these conditions and causing the function to repeatedly attempt the operation without success. This was discovered by the Linux Verification Center (linuxtesting.org).

**Recommendations:**

Update to Linux kernel version 5.10.240 or later to resolve this issue.

Related Identifiers

CVE-2025-38727

Affected Products

Linux Kernel