PT-2025-36000 · Linux · Linux Kernel
Published
2025-09-04
·
Updated
2025-09-04
·
CVE-2025-38727
None
**Name of the Vulnerable Software and Affected Versions:**
Linux kernel versions prior to 5.10.240
**Description:**
A flaw exists in the Linux kernel's netlink subsystem, specifically within the `netlink unicast()` function. The `netlink attachskb()` function, used for socket memory allocation checks, can enter an indefinite retry loop under specific conditions where `skb->truesize + sk->sk rmem alloc` is equal to `sk->sk rcvbuf`. This can lead to a system stall, as indicated by RCU (Read-Copy Update) self-detected stall messages. The issue arises from an incomplete check during memory allocation, failing to properly handle these conditions and causing the function to repeatedly attempt the operation without success. This was discovered by the Linux Verification Center (linuxtesting.org).
**Recommendations:**
Update to Linux kernel version 5.10.240 or later to resolve this issue.
Related Identifiers
Affected Products
References · 11
- https://nvd.nist.gov/vuln/detail/CVE-2025-38727 · Security Note
- https://git.kernel.org/stable/c/e8edc7de688791a337c068693f22e8d8b869df71 · Note
- https://git.kernel.org/stable/c/47d49fd07f86d1f55ea1083287303d237e9e0922 · Note
- https://git.kernel.org/stable/c/6bee383ff83352a693d03efdf27cdd80742f71b2 · Note
- https://git.kernel.org/stable/c/346c820ef5135cf062fa3473da955ef8c5fb6929 · Note
- https://git.kernel.org/stable/c/44ddd7b1ae0b7edb2c832eb16798c827a05e58f0 · Note
- https://git.kernel.org/stable/c/78fcd69d55c5f11d7694c547eca767a1cfd38ec4 · Note
- https://git.kernel.org/stable/c/f324959ad47e62e3cadaffa65d3cff790fb48529 · Note
- https://git.kernel.org/stable/c/759dfc7d04bab1b0b86113f1164dc1fec192b859 · Note
- https://twitter.com/CVEnew/status/1963637901604131070 · Twitter Post
- https://git.kernel.org/stable/c/d42b71a34f6b8a2d5c53df81169b03b8d8b5cf4e · Note