Wind River Support Network

HomeDefectsLIN1024-10649
Fixed

LIN1024-10649 : Security Advisory - linux - CVE-2025-38465

Created: Jul 28, 2025    Updated: Aug 10, 2025
Resolved Date: Aug 10, 2025
Found In Version: 10.24.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 24
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]netlink: Fix wraparounds of sk->sk_rmem_alloc.[EOL][EOL]Netlink has this pattern in some places[EOL][EOL]  if (atomic_read(&sk->sk_rmem_alloc) > sk->sk_rcvbuf)[EOL]  \tatomic_add(skb->truesize, &sk->sk_rmem_alloc);[EOL][EOL], which has the same problem fixed by commit 5a465a0da13e ("udp:[EOL]Fix multiple wraparounds of sk->sk_rmem_alloc.").[EOL][EOL]For example, if we set INT_MAX to SO_RCVBUFFORCE, the condition[EOL]is always false as the two operands are of int.[EOL][EOL]Then, a single socket can eat as many skb as possible until OOM[EOL]happens, and we can see multiple wraparounds of sk->sk_rmem_alloc.[EOL][EOL]Let's fix it by using atomic_add_return() and comparing the two[EOL]variables as unsigned int.[EOL][EOL]Before:[EOL]  [root@fedora ~]# ss -f netlink[EOL]  Recv-Q      Send-Q Local Address:Port                Peer Address:Port[EOL]  -1668710080 0               rtnl:nl_wraparound/293               *[EOL][EOL]After:[EOL]  [root@fedora ~]# ss -f netlink[EOL]  Recv-Q     Send-Q Local Address:Port                Peer Address:Port[EOL]  2147483072 0               rtnl:nl_wraparound/290               *[EOL]  ^[EOL]  `--- INT_MAX - 576

CREATE(Triage):(User=admin) [CVE-2025-38465 (https://nvd.nist.gov/vuln/detail/CVE-2025-38465)

CVEs


Live chat
Online