CVE-2025-38005
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-12-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.6 (inc) to 5.10.238 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.184 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.140 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.92 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.30 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.14.8 (exc) |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-Other |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves a missing lock in the k3-udma driver within the dmaengine subsystem. When the lock validator is enabled, the kernel reports warnings about the missing lock, which can lead to potential race conditions or improper synchronization in the driver code. The issue was fixed by adding the missing locking mechanism.
How can this vulnerability impact me? :
The missing lock in the k3-udma driver can cause race conditions or data corruption due to improper synchronization in the DMA engine operations. This may lead to system instability, unexpected behavior, or crashes in systems using the affected driver.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the system logs for kernel warnings related to missing locking in the k3-udma driver. Specifically, look for messages similar to the following in the kernel log: "WARNING: CPU: ... at drivers/dma/ti/../virt-dma.h:169 udma_start.isra.0+0x34/0x238". You can use the command 'dmesg | grep udma_start' or 'journalctl -k | grep udma_start' to find such warnings.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update the Linux kernel to a version that includes the fix for the missing locking in the k3-udma driver. This fix adds the missing locking to prevent the warning and potential issues. Until the update is applied, monitoring for the warning messages and avoiding workloads that trigger this code path may reduce risk.