CVE-2025-38067

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38067
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38067.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38067
Downstream
Published
2025-06-18T09:33:45.518Z
Modified
2025-11-28T02:34:38.754673Z
Summary
rseq: Fix segfault on registration when rseq_cs is non-zero
Details

In the Linux kernel, the following vulnerability has been resolved:

rseq: Fix segfault on registration when rseq_cs is non-zero

The rseqcs field is documented as being set to 0 by user-space prior to registration, however this is not currently enforced by the kernel. This can result in a segfault on return to user-space if the value stored in the rseqcs field doesn't point to a valid struct rseq_cs.

The correct solution to this would be to fail the rseq registration when the rseqcs field is non-zero. However, some older versions of glibc will reuse the rseq area of previous threads without clearing the rseqcs field and will also terminate the process if the rseq registration fails in a secondary thread. This wasn't caught in testing because in this case the leftover rseqcs does point to a valid struct rseqcs.

What we can do is clear the rseq_cs field on registration when it's non-zero which will prevent segfaults on registration and won't break the glibc versions that reuse rseq areas on thread creation.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38067.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d7822b1e24f2df5df98c76f0e94a5416349ff759
Fixed
48900d839a3454050fd5822e34be8d54c4ec9b86
Fixed
3e4028ef31b69286c9d4878cee0330235f53f218
Fixed
b2b05d0dc2f4f0646922068af435aed5763d16ba
Fixed
eaf112069a904b6207b4106ff083e0208232a2eb
Fixed
f004f58d18a2d3dc761cf973ad27b4a5997bd876
Fixed
2df285dab00fa03a3ef939b6cb0d0d0aeb0791db
Fixed
fd881d0a085fc54354414aed990ccf05f282ba53

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.18.0
Fixed
5.10.240
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.189
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.146
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.99
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.39
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.14.9