The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-37928

CVE-2025-37928: Linux Kernel Race Condition Vulnerability

CVE-2025-37928 is a race condition vulnerability in the Linux Kernel's dm-bufio component that causes sleeping in atomic context, leading to system crashes. This article covers technical details, affected versions, and mitigation.

Updated: January 22, 2026

CVE-2025-37928 Overview

A vulnerability has been identified in the Linux kernel's dm-bufio (device mapper buffered I/O) subsystem where the kernel incorrectly attempts to schedule operations while in an atomic context. This issue occurs when CONFIG_DEBUG_ATOMIC_SLEEP and try_verify_in_tasklet are enabled, causing the dm_bufio_lock function to call spin_lock_bh, which then triggers a scheduling attempt during atomic execution in the __scan function.

The bug manifests as a kernel BUG that reports a "sleeping function called from invalid context" at drivers/md/dm-bufio.c:2421. This occurs because the code path attempts to perform operations that may sleep while holding spinlocks with bottom-halves disabled, violating Linux kernel's fundamental scheduling constraints.

Critical Impact

Local attackers with low privileges can exploit this vulnerability to cause system crashes or potentially achieve privilege escalation by corrupting kernel memory state during the race condition window.

Affected Products

  • Linux Kernel (multiple versions including 6.15-rc1 through 6.15-rc4)
  • Debian Linux 11.0
  • Linux kernel versions with dm-bufio subsystem enabled

Discovery Timeline

  • May 20, 2025 - CVE CVE-2025-37928 published to NVD
  • November 10, 2025 - Last updated in NVD database

Technical Details for CVE-2025-37928

Vulnerability Analysis

This vulnerability represents a classic race condition in the Linux kernel's device mapper buffered I/O subsystem. The root issue stems from improper context handling where code attempts to perform potentially blocking operations while the kernel is in an atomic (non-preemptible) state.

When the shrink_work function executes as part of the dm_bufio_cache workqueue, it acquires a spinlock with bottom-halves disabled via spin_lock_bh. While holding this lock, the code path enters the __scan function which may attempt operations that could sleep or reschedule. This violates a fundamental Linux kernel rule: code running in atomic context must never call functions that might sleep.

The impact includes kernel panics, system instability, and potential memory corruption. An attacker with local access could trigger this condition to cause denial of service or potentially leverage the corrupted kernel state for privilege escalation.

Root Cause

The vulnerability originates from the dm_bufio_lock function which calls spin_lock_bh when try_verify_in_tasklet is enabled. This places the execution context into atomic mode where preemption is disabled (preempt_count: 201). Subsequently, when __scan is invoked through the shrink_work workqueue handler, the kernel detects that a potentially sleeping function is being called from this invalid atomic context.

The kernel reports:

  • in_atomic(): 1 - confirming atomic context
  • irqs_disabled(): 0 - IRQs are not disabled
  • preempt_count: 201, expected: 0 - preemption is disabled when it shouldn't be
  • Preemption disabled at shrink_work+0x21c/0x248

Attack Vector

Exploitation requires local access to the system with low-level privileges. An attacker would need to:

  1. Trigger memory pressure conditions that invoke the dm-bufio cache shrinking mechanism
  2. Ensure try_verify_in_tasklet is enabled in the kernel configuration
  3. Race the timing to cause the scheduling conflict during the atomic context window

The vulnerability affects systems running the dm-bufio module, commonly used for device mapper operations including dm-verity and dm-crypt, which are prevalent in Android devices and encrypted storage configurations.

The bug manifests in the call trace starting from worker_thread → process_one_work → shrink_work → __might_resched, ultimately triggering the android_rvh_schedule_bug handler on affected Qualcomm-based Android devices.

Detection Methods for CVE-2025-37928

Indicators of Compromise

  • Kernel log messages containing "BUG: sleeping function called from invalid context at drivers/md/dm-bufio.c"
  • System crashes or panics involving shrink_work in the call trace
  • Kernel oops messages referencing dm_bufio_cache workqueue
  • Debug messages showing preempt_count values significantly above expected (e.g., 201 vs 0)

Detection Strategies

  • Monitor kernel logs (dmesg) for atomic sleep warnings related to dm-bufio subsystem
  • Implement kernel trace monitoring for scheduling anomalies in device mapper paths
  • Deploy crash dump analysis tools to capture and analyze kernel panic events involving dm_bufio_lock
  • Enable CONFIG_DEBUG_ATOMIC_SLEEP in test environments to proactively identify the vulnerability

Monitoring Recommendations

  • Configure syslog alerting for kernel BUG messages containing "dm-bufio" or "atomic context"
  • Implement automated kernel log analysis for preemption count violations
  • Monitor system stability metrics for unexpected reboots or crashes on systems using dm-crypt or dm-verity
  • Use eBPF-based monitoring to track spinlock acquisition patterns in dm-bufio code paths

How to Mitigate CVE-2025-37928

Immediate Actions Required

  • Apply the kernel patches from the official Linux kernel git repository
  • Disable try_verify_in_tasklet if immediate patching is not possible
  • Upgrade to patched kernel versions as soon as available
  • Monitor affected systems for signs of exploitation attempts

Patch Information

Multiple patches have been released to address this vulnerability. The fix ensures that scheduling operations are not attempted while in atomic context within the dm-bufio subsystem. Apply one of the following commits based on your kernel version:

  • Kernel Commit 69a37b3ba85088fc6b903b8e1db7f0a1d4d0b52d
  • Kernel Commit a3d8f0a7f5e8b193db509c7191fefeed3533fc44
  • Kernel Commit a99f5bf4f7197009859dbce14c12f8e2ce5a5a69
  • Kernel Commit c8c83052283bcf2fdd467a33d1d2bd5ba36e935a
  • Kernel Commit f45108257280e0a1cc951ce254853721b40c0812

Debian users should refer to the Debian LTS Security Announcement for distribution-specific packages.

Workarounds

  • Disable try_verify_in_tasklet module parameter if your use case permits
  • Reduce memory pressure scenarios that trigger dm-bufio cache shrinking
  • Isolate systems running vulnerable kernel versions from untrusted local access
  • Consider disabling dm-verity verification if not required for your security posture
bash
# Check current kernel version
uname -r

# Verify dm-bufio module status
lsmod | grep dm_bufio

# Check for available kernel updates (Debian/Ubuntu)
apt update && apt list --upgradable | grep linux-image

# Check for available kernel updates (RHEL/CentOS)
yum check-update kernel

# Apply kernel updates (Debian/Ubuntu)
apt upgrade linux-image-$(uname -r | sed 's/[0-9]*\.[0-9]*\.[0-9]*-//')

# Reboot to apply new kernel
shutdown -r now

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRace Condition

  • Vendor/TechLinux Kernel

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.26%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-noinfo
  • Technical References
  • Debian LTS Security Announcement
  • Vendor Resources
  • Linux Kernel Commit Update

  • Linux Kernel Commit Change

  • Linux Kernel Commit Enhancement

  • Linux Kernel Commit Fix

  • Linux Kernel Commit Improvement
  • Related CVEs
  • CVE-2026-23440: Linux Kernel Race Condition Vulnerability

  • CVE-2026-23434: Linux Kernel Race Condition Vulnerability

  • CVE-2026-23436: Linux Kernel Race Condition Vulnerability

  • CVE-2026-23463: Linux Kernel QBMAN Race Condition Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English