CVE-2025-38727

Source
https://cve.org/CVERecord?id=CVE-2025-38727
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38727.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-38727
Downstream
Related
Published
2025-09-04T15:33:25.286Z
Modified
2026-03-13T03:03:18.491549Z
Summary
netlink: avoid infinite retry looping in netlink_unicast()
Details

In the Linux kernel, the following vulnerability has been resolved:

netlink: avoid infinite retry looping in netlink_unicast()

netlink_attachskb() checks for the socket's read memory allocation constraints. Firstly, it has:

rmem < READONCE(sk->skrcvbuf)

to check if the just increased rmem value fits into the socket's receive buffer. If not, it proceeds and tries to wait for the memory under:

rmem + skb->truesize > READONCE(sk->skrcvbuf)

The checks don't cover the case when skb->truesize + sk->skrmemalloc is equal to sk->sk_rcvbuf. Thus the function neither successfully accepts these conditions, nor manages to reschedule the task - and is called in retry loop for indefinite time which is caught as:

rcu: INFO: rcusched self-detected stall on CPU rcu: 0-....: (25999 ticks this GP) idle=ef2/1/0x4000000000000000 softirq=262269/262269 fqs=6212 (t=26000 jiffies g=230833 q=259957) NMI backtrace for cpu 0 CPU: 0 PID: 22 Comm: kauditd Not tainted 5.10.240 #68 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc42 04/01/2014 Call Trace: <IRQ> dumpstack lib/dumpstack.c:120 nmicpubacktrace.cold lib/nmibacktrace.c:105 nmitriggercpumaskbacktrace lib/nmibacktrace.c:62 rcudumpcpustacks kernel/rcu/treestall.h:335 rcuschedclockirq.cold kernel/rcu/tree.c:2590 updateprocesstimes kernel/time/timer.c:1953 tickschedhandle kernel/time/tick-sched.c:227 ticksched_timer kernel/time/tick-sched.c:1399 __hrtimerrunqueues kernel/time/hrtimer.c:1652 hrtimer_interrupt kernel/time/hrtimer.c:1717 __sysvecapictimerinterrupt arch/x86/kernel/apic/apic.c:1113 asmcallirqonstack arch/x86/entry/entry64.S:808 </IRQ>

netlinkattachskb net/netlink/afnetlink.c:1234 netlinkunicast net/netlink/afnetlink.c:1349 kauditdsendqueue kernel/audit.c:776 kauditdthread kernel/audit.c:897 kthread kernel/kthread.c:328 retfromfork arch/x86/entry/entry64.S:304

Restore the original behavior of the check which commit in Fixes accidentally missed when restructuring the code.

Found by Linux Verification Center (linuxtesting.org).

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38727.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9da025150b7c14a8390fc06aea314c0a4011e82c
Fixed
47d49fd07f86d1f55ea1083287303d237e9e0922
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c4ceaac5c5ba0b992ee1dc88e2a02421549e5c98
Fixed
6bee383ff83352a693d03efdf27cdd80742f71b2
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fd69af06101090eaa60b3d216ae715f9c0a58e5b
Fixed
f324959ad47e62e3cadaffa65d3cff790fb48529
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
76602d8e13864524382b0687dc32cd8f19164d5a
Fixed
d42b71a34f6b8a2d5c53df81169b03b8d8b5cf4e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
55baecb9eb90238f60a8350660d6762046ebd3bd
Fixed
346c820ef5135cf062fa3473da955ef8c5fb6929
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4b8e18af7bea92f8b7fb92d40aeae729209db250
Fixed
44ddd7b1ae0b7edb2c832eb16798c827a05e58f0
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cd7ff61bfffd7000143c42bbffb85eeb792466d6
Fixed
78fcd69d55c5f11d7694c547eca767a1cfd38ec4
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ae8f160e7eb24240a2a79fc4c815c6a0d4ee16cc
Fixed
e8edc7de688791a337c068693f22e8d8b869df71
Fixed
759dfc7d04bab1b0b86113f1164dc1fec192b859

Affected versions

v5.*
v5.10.240
v5.15.189
v5.4.296
v6.*
v6.1.146
v6.1.147
v6.1.148
v6.12.39
v6.12.40
v6.12.41
v6.12.42
v6.15.10
v6.15.7
v6.15.8
v6.15.9
v6.16
v6.16-rc5
v6.16-rc6
v6.16-rc7
v6.16.1
v6.6.100
v6.6.101
v6.6.102
v6.6.99

Database specific

vanir_signatures
[
    {
        "target": {
            "function": "netlink_attachskb",
            "file": "net/netlink/af_netlink.c"
        },
        "id": "CVE-2025-38727-84594413",
        "digest": {
            "function_hash": "265944914468520489195374296066329607418",
            "length": 1118.0
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@346c820ef5135cf062fa3473da955ef8c5fb6929",
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "target": {
            "file": "net/netlink/af_netlink.c"
        },
        "id": "CVE-2025-38727-85b17050",
        "digest": {
            "line_hashes": [
                "288174083106587028724693030720543658844",
                "193718157317070494891479479686005976057",
                "253893257050575761837168580095433414041",
                "41583178040404582373533583948116673000"
            ],
            "threshold": 0.9
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@346c820ef5135cf062fa3473da955ef8c5fb6929",
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Line"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38727.json"