๐Ÿ” CVE Alert

CVE-2025-38067

UNKNOWN 0.0

rseq: Fix segfault on registration when rseq_cs is non-zero

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: rseq: Fix segfault on registration when rseq_cs is non-zero The rseq_cs field is documented as being set to 0 by user-space prior to registration, however this is not currently enforced by the kernel. This can result in a segfault on return to user-space if the value stored in the rseq_cs field doesn't point to a valid struct rseq_cs. The correct solution to this would be to fail the rseq registration when the rseq_cs field is non-zero. However, some older versions of glibc will reuse the rseq area of previous threads without clearing the rseq_cs field and will also terminate the process if the rseq registration fails in a secondary thread. This wasn't caught in testing because in this case the leftover rseq_cs does point to a valid struct rseq_cs. What we can do is clear the rseq_cs field on registration when it's non-zero which will prevent segfaults on registration and won't break the glibc versions that reuse rseq areas on thread creation.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jun 18, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d7822b1e24f2df5df98c76f0e94a5416349ff759 < 48900d839a3454050fd5822e34be8d54c4ec9b86 d7822b1e24f2df5df98c76f0e94a5416349ff759 < 3e4028ef31b69286c9d4878cee0330235f53f218 d7822b1e24f2df5df98c76f0e94a5416349ff759 < b2b05d0dc2f4f0646922068af435aed5763d16ba d7822b1e24f2df5df98c76f0e94a5416349ff759 < eaf112069a904b6207b4106ff083e0208232a2eb d7822b1e24f2df5df98c76f0e94a5416349ff759 < f004f58d18a2d3dc761cf973ad27b4a5997bd876 d7822b1e24f2df5df98c76f0e94a5416349ff759 < 2df285dab00fa03a3ef939b6cb0d0d0aeb0791db d7822b1e24f2df5df98c76f0e94a5416349ff759 < fd881d0a085fc54354414aed990ccf05f282ba53
Linux / Linux
4.18

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/48900d839a3454050fd5822e34be8d54c4ec9b86 git.kernel.org: https://git.kernel.org/stable/c/3e4028ef31b69286c9d4878cee0330235f53f218 git.kernel.org: https://git.kernel.org/stable/c/b2b05d0dc2f4f0646922068af435aed5763d16ba git.kernel.org: https://git.kernel.org/stable/c/eaf112069a904b6207b4106ff083e0208232a2eb git.kernel.org: https://git.kernel.org/stable/c/f004f58d18a2d3dc761cf973ad27b4a5997bd876 git.kernel.org: https://git.kernel.org/stable/c/2df285dab00fa03a3ef939b6cb0d0d0aeb0791db git.kernel.org: https://git.kernel.org/stable/c/fd881d0a085fc54354414aed990ccf05f282ba53 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-082556.html