CVE-2025-38010
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-Other |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's Tegra xusb driver involves improper tracking of the UTMI pad power state. The current implementation uses a single reference count (bias_pad_enable) to manage the shared bias pad for all UTMI PHYs. During system suspension with connected USB devices, multiple power-down requests cause a mismatch in this reference count, leading to warnings and potential power state inconsistencies. The root cause is that the UTMI pad was powered down without verifying its current state, causing unbalanced reference counting. The fix replaces the single reference counter with a bitmask to track each of the four USB2 PHY pads individually, ensuring correct power state management and preventing race conditions.
How can this vulnerability impact me? :
This vulnerability can cause incorrect power state management of USB PHY pads during system suspend/resume cycles, leading to kernel warnings and potentially unstable or unexpected behavior in USB device handling. It may result in power management issues, such as improper powering down or up of USB components, which could affect system stability or USB device functionality during suspend or resume operations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for specific warning messages related to the UTMI pad power state mismatch. Look for kernel warnings similar to: "WARNING: CPU: ... at tegra186_utmi_pad_power_down" and the associated call trace. You can use the command `dmesg | grep tegra186_utmi_pad_power_down` or `journalctl -k | grep tegra186_utmi_pad_power_down` to find these warnings in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the patch fixing this issue. The patch replaces the single reference counter with a bitmask to correctly track the UTMI pad power state and prevents race conditions. Until the update is applied, monitoring for the warning messages and avoiding system suspend/resume cycles with connected USB devices may reduce the risk of encountering the issue.