CVE-2025-38524
Linux Kernel vulnerability analysis and mitigation

Overview

A race condition vulnerability was discovered in the Linux kernel's rxrpc subsystem, identified as CVE-2025-38524. The vulnerability was disclosed on August 16, 2025, and affects the recv-recv handling of completed calls in the Linux kernel (NVD CVE).

Technical details

The vulnerability occurs in the rxrpc subsystem when handling completed calls. When a call receives an event, it gets placed on the socket's queue and a thread in recvmsg is awakened to process it. After the thread picks up the call from the queue, further events cause requeuing, and when the socket lock is dropped, a second thread can attempt to process the same call. This can lead to a race condition where the first thread processes both events and terminates the call, while the second thread, still holding user_mutex, encounters a kernel BUG at net/rxrpc/recvmsg.c:474 (NVD CVE).

Impact

The vulnerability can result in a kernel BUG condition, potentially causing system instability or crashes. The issue specifically affects the rxrpc subsystem's handling of socket events and call termination (NVD CVE).

Mitigation and workarounds

The fix involves modifying the call handling logic to dequeue and ignore calls that are already released, as the user call ID becomes stale in such cases. This prevents the kernel BUG condition from occurring (NVD CVE).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management