CVE-2025-38359

5.5 MEDIUM

📋 TL;DR

A Linux kernel vulnerability on s390 systems where secure storage access faults are incorrectly handled in atomic context, potentially causing kernel crashes or denial of service. This affects Linux systems running on IBM s390/zSeries architecture with secure storage features enabled.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Versions up to and including 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug
Operating Systems: Linux distributions running on IBM s390/zSeries architecture
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects s390 architecture systems with secure storage features. The vulnerability manifests during specific atomic context operations.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic or system crash leading to denial of service, potentially disrupting critical workloads on affected s390 systems.

🟠

Likely Case

System instability or crashes when secure storage operations occur in atomic context, particularly during I/O operations or virtualization workloads.

🟢

If Mitigated

Minimal impact as the fix causes secure storage access faults to return -EFAULT instead of attempting to resolve page faults in atomic context.

🌐 Internet-Facing: LOW - This is a kernel-level issue requiring local access or specific workload conditions.
🏢 Internal Only: MEDIUM - Affects s390 systems running vulnerable kernel versions, particularly those with secure storage operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires triggering secure storage access faults in atomic context, which is a specific condition. No known public exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits 11709abccf93b08adde95ef313c300b0d4bc28f1 and d2e317dfd2d1fe416c77315d17c5d57dbe374915

Vendor Advisory: https://git.kernel.org/stable/c/11709abccf93b08adde95ef313c300b0d4bc28f1

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing fixes. 2. For distributions: Apply vendor kernel updates. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable secure storage features

linux

If secure storage is not required, disable related features to avoid triggering the vulnerability

echo 'secure_storage=0' >> /etc/sysctl.conf
sysctl -p

🧯 If You Can't Patch

  • Monitor system logs for BUG: sleeping function called from invalid context warnings
  • Avoid workloads that trigger secure storage operations in atomic context

🔍 How to Verify

Check if Vulnerable:

Check kernel version and architecture: uname -r should show vulnerable version on s390 systems

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is newer than affected versions and check for absence of the specific call trace in logs

📡 Detection & Monitoring

Log Indicators:

  • BUG: sleeping function called from invalid context
  • do_secure_storage_access in call traces
  • copy_page_from_iter_atomic related errors

SIEM Query:

kernel_logs | where message contains "BUG: sleeping function called from invalid context" and message contains "do_secure_storage_access"

🔗 References

📤 Share & Export