Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-38670— arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack()

EPSS 0.02% · P7

Affected Version Matrix 17

VendorProductVersion RangeStatus
LinuxLinux3f225f29c69c13ce1cbdb1d607a42efeef080056< f7e0231eeaa33245c649fac0303cf97209605446affected
402d2b1d54b7085d0c3bfd01fd50c2701dde64b3< 407047893a64399f2d2390ff35cc6061107d805daffected
4403c7b7e5e1ad09a266b6e399fd7bf97931508e< a6b0cb523eaa01efe8a3f76ced493ba60674c6e6affected
59b37fe52f49955791a460752c37145f1afdcad1< 9433a5f437b0948d6a2d8a02ad7a42ab7ca27a61affected
59b37fe52f49955791a460752c37145f1afdcad1< 708fd522b86d2a9544c34ec6a86fa3fc23336525affected
59b37fe52f49955791a460752c37145f1afdcad1< 0f67015d72627bad72da3c2084352e0aa134416baffected
59b37fe52f49955791a460752c37145f1afdcad1< d42e6c20de6192f8e4ab4cf10be8c694ef27e8cbaffected
e47ce4f11e26fa3ea99b09521da8b3ac3a7b578daffected
… +9 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-38670

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack()
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() `cpu_switch_to()` and `call_on_irq_stack()` manipulate SP to change to different stacks along with the Shadow Call Stack if it is enabled. Those two stack changes cannot be done atomically and both functions can be interrupted by SErrors or Debug Exceptions which, though unlikely, is very much broken : if interrupted, we can end up with mismatched stacks and Shadow Call Stack leading to clobbered stacks. In `cpu_switch_to()`, it can happen when SP_EL0 points to the new task, but x18 stills points to the old task's SCS. When the interrupt handler tries to save the task's SCS pointer, it will save the old task SCS pointer (x18) into the new task struct (pointed to by SP_EL0), clobbering it. In `call_on_irq_stack()`, it can happen when switching from the task stack to the IRQ stack and when switching back. In both cases, we can be interrupted when the SCS pointer points to the IRQ SCS, but SP points to the task stack. The nested interrupt handler pushes its return addresses on the IRQ SCS. It then detects that SP points to the task stack, calls `call_on_irq_stack()` and clobbers the task SCS pointer with the IRQ SCS pointer, which it will also use ! This leads to tasks returning to addresses on the wrong SCS, or even on the IRQ SCS, triggering kernel panics via CONFIG_VMAP_STACK or FPAC if enabled. This is possible on a default config, but unlikely. However, when enabling CONFIG_ARM64_PSEUDO_NMI, DAIF is unmasked and instead the GIC is responsible for filtering what interrupts the CPU should receive based on priority. Given the goal of emulating NMIs, pseudo-NMIs can be received by the CPU even in `cpu_switch_to()` and `call_on_irq_stack()`, possibly *very* frequently depending on the system configuration and workload, leading to unpredictable kernel panics. Completely mask DAIF in `cpu_switch_to()` and restore it when returning. Do the same in `call_on_irq_stack()`, but restore and mask around the branch. Mask DAIF even if CONFIG_SHADOW_CALL_STACK is not enabled for consistency of behaviour between all configurations. Introduce and use an assembly macro for saving and masking DAIF, as the existing one saves but only masks IF.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于未屏蔽DAIF标志,可能导致堆栈不匹配。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 3f225f29c69c13ce1cbdb1d607a42efeef080056 ~ f7e0231eeaa33245c649fac0303cf97209605446 -
LinuxLinux 6.3 -

II. Public POCs for CVE-2025-38670

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-38670

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-08-22 · 60 CVEs total

CVE-2025-38634power: supply: cpcap-charger: Fix null check for power_supply_get_by_name
CVE-2025-38616tls: handle data disappearing from under the TLS ULP
CVE-2025-38620zloop: fix KASAN use-after-free of tag set
CVE-2025-38619media: ti: j721e-csi2rx: fix list_del corruption
CVE-2025-38621md: make rdev_addable usable for rcu mode
CVE-2025-38618vsock: Do not allow binding to VMADDR_PORT_ANY
CVE-2025-38630fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref
CVE-2025-38632pinmux: fix race causing mux_owner NULL with active mux_usecount
CVE-2025-38631clk: imx95-blk-ctl: Fix synchronous abort
CVE-2025-38633clk: spacemit: mark K1 pll1_d8 as critical
CVE-2025-38629ALSA: usb: scarlett2: Fix missing NULL check
CVE-2025-38635clk: davinci: Add NULL check in davinci_lpsc_clk_register()
CVE-2025-38636rv: Use strings in da monitors tracepoints
CVE-2025-38638ipv6: add a retry logic in net6_rt_notify()
CVE-2025-38639netfilter: xt_nfacct: don't assume acct name is null-terminated
CVE-2025-38640bpf: Disable migration in nf_hook_run_bpf().
CVE-2025-38641Bluetooth: btusb: Fix potential NULL dereference on kmalloc failure
CVE-2025-38642wifi: mac80211: fix WARN_ON for monitor mode on some devices
CVE-2025-38643wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac()
CVE-2025-38644wifi: mac80211: reject TDLS operations when station is not associated

Showing top 20 of 60 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-38670

No comments yet


Leave a comment