CVE-2025-38132
BaseFortify
Publication date: 2025-07-03
Last updated on: 2025-11-20
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's coresight configuration management. It occurs because the lock (cscfg_csdev_lock) is not held while removing configuration entries from the config_csdev_list, which can lead to concurrent modification issues when multiple CPUs are enabling, loading, activating, deactivating, or unloading coresight configurations simultaneously. The fix involves holding the lock during the removal of owned coresight device configurations to prevent this race.
How can this vulnerability impact me? :
The race condition could lead to inconsistent or corrupted coresight configuration states, potentially causing system instability or unexpected behavior in performance monitoring or debugging features that rely on coresight. This could affect system reliability or security depending on how coresight is used.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update to the Linux kernel version that includes the fix for this vulnerability, which ensures that the csdev->cscfg_csdev_lock is held while removing cscfg from csdev to prevent the race condition.