5.5 CVE-2025-38614

Enriched by CISA Patch
 

In the Linux kernel, the following vulnerability has been resolved: eventpoll: Fix semi-unbounded recursion Ensure that epoll instances can never form a graph deeper than EP_MAX_NESTS+1 links. Currently, ep_loop_check_proc() ensures that the graph is loop-free and does some recursion depth checks, but those recursion depth checks don't limit the depth of the resulting tree for two reasons: - They don't look upwards in the tree. - If there are multiple downwards paths of different lengths, only one of the paths is actually considered for the depth check since commit 28d82dc1c4ed ("epoll: limit paths"). Essentially, the current recursion depth check in ep_loop_check_proc() just serves to prevent it from recursing too deeply while checking for loops. A more thorough check is done in reverse_path_check() after the new graph edge has already been created; this checks, among other things, that no paths going upwards from any non-epoll file with a length of more than 5 edges exist. However, this check does not apply to non-epoll files. As a result, it is possible to recurse to a depth of at least roughly 500, tested on v6.15. (I am unsure if deeper recursion is possible; and this may have changed with commit 8c44dac8add7 ("eventpoll: Fix priority inversion problem").) To fix it: 1. In ep_loop_check_proc(), note the subtree depth of each visited node, and use subtree depths for the total depth calculation even when a subtree has already been visited. 2. Add ep_get_upwards_depth_proc() for similarly determining the maximum depth of an upwards walk. 3. In ep_loop_check(), use these values to limit the total path length between epoll nodes to EP_MAX_NESTS edges.
https://nvd.nist.gov/vuln/detail/CVE-2025-38614

Categories

CWE-674 : Uncontrolled Recursion
The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack. Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.) Ensure an end condition will be reached under all logic conditions. The end condition may include testing against the depth of recursion and exiting with an error if the recursion goes too deep. The complexity of the end condition contributes to the effectiveness of this action. Increase the stack size. Deeply nested arrays trigger stack exhaustion. Self-referencing pointers create infinite loop and resultant stack exhaustion. Javascript application accidentally changes input in a way that prevents a recursive call from detecting an exit condition. An attempt to recover a corrupted XML file infinite recursion protection counter was not always incremented missing the exit condition. USB-audio driver's descriptor code parsing allows unlimited recursion leading to stack exhaustion.

References


 

AFFECTED (from MITRE)


Vendor Product Versions
Linux Linux
  • 22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e < 71379495ab70eaba19224bd71b5b9b399eb85e04 [affected]
  • 22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e < 1b13b033062824495554e836a1ff5f85ccf6b039 [affected]
  • 22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e < 2a0c0c974bea9619c6f41794775ae4b97530e0e6 [affected]
  • 22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e < 7a2125962c42d5336ca0495a9ce4cb38a63e9161 [affected]
  • 22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e < ea5f97dbdcb1651581a22bd10afd2f0dd9dc11d6 [affected]
  • 22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e < 3542c90797bc3ab83ebab54b737d751cf3682036 [affected]
  • 22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e < f2e467a48287c868818085aa35389a224d226732 [affected]
  • 8216e1a0d47cae06a75c42346f19dffe14e42d57 [affected]
  • 28a92748aa4bc57d35e7b079498b0ac2e7610a37 [affected]
  • 7eebcd4792c5a341559aed327b6afecbb1c46402 [affected]
  • 0eccd188cfeaf857a26f2d72941d27d298cf6a54 [affected]
  • a72affdbb09f3f24f64ffcbbdf62c2e57c58f379 [affected]
Linux Linux
  • 2.6.38 [affected]
  • < 2.6.38 [unaffected]
  • 5.15.190 ≤ 5.15.* [unaffected]
  • 6.1.149 ≤ 6.1.* [unaffected]
  • 6.6.103 ≤ 6.6.* [unaffected]
  • 6.12.43 ≤ 6.12.* [unaffected]
  • 6.15.11 ≤ 6.15.* [unaffected]
  • 6.16.1 ≤ 6.16.* [unaffected]
  • 6.17 ≤ * [unaffected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end
Configuration 1
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 2.6.32.30 < 2.6.33
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 2.6.33.8 < 2.6.34
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 2.6.34.10 < 2.6.35
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 2.6.35.12 < 2.6.36
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 2.6.37.3 < 2.6.38
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 2.6.38.1 < 5.15.190
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 5.16 < 6.1.149
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.2 < 6.6.103
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.7 < 6.12.43
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.13 < 6.15.11
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.16 < 6.16.1
cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.38:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.38:rc8:*:*:*:*:*:*
Configuration 2
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*


REMEDIATION


Patch

Url
https://git.kernel.org/stable/c/1b13b033062824495554e836a1ff5f85ccf6b039
https://git.kernel.org/stable/c/2a0c0c974bea9619c6f41794775ae4b97530e0e6
https://git.kernel.org/stable/c/3542c90797bc3ab83ebab54b737d751cf3682036
https://git.kernel.org/stable/c/71379495ab70eaba19224bd71b5b9b399eb85e04
https://git.kernel.org/stable/c/7a2125962c42d5336ca0495a9ce4cb38a63e9161
https://git.kernel.org/stable/c/ea5f97dbdcb1651581a22bd10afd2f0dd9dc11d6
https://git.kernel.org/stable/c/f2e467a48287c868818085aa35389a224d226732


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
230 Serialized Data with Nested Payloads
High
231 Oversized Serialized Data Payloads
High