CVE-2025-38136
BaseFortify
Publication date: 2025-07-03
Last updated on: 2025-12-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 3.0 (inc) to 5.4.295 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.239 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.186 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.142 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.94 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.34 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.3 (exc) |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-908 | The product uses or accesses a resource that has not been initialized. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's Renesas USBHS driver where the initialization sequence in the usbhs_probe() function accesses hardware registers before enabling the necessary clocks. This improper sequence can cause a synchronous external abort (crash) on certain hardware like the Renesas RZ/V2H SoC because the registers are accessed without the required clocks being active. The fix involves reordering the initialization to enable runtime power management and clocks before any register access, preventing these crashes.
How can this vulnerability impact me? :
If your system uses the affected Renesas USBHS driver on hardware like the RZ/V2H SoC, this vulnerability can cause system crashes due to improper register access before clocks are enabled. This can lead to instability, unexpected reboots, or failures in USB functionality, potentially disrupting normal operations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for kernel error messages related to the renesas_usbhs driver, specifically looking for synchronous external abort errors during usbhs_probe execution. You can check the kernel log using commands like 'dmesg | grep renesas_usbhs' or 'journalctl -k | grep renesas_usbhs' to identify crash traces similar to those described in the vulnerability report.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the Linux kernel to a version where the usb: renesas_usbhs driver has been fixed by reordering clock handling and power management in the usbhs_probe function. This ensures runtime power management is enabled before register access, preventing crashes. Until the update is applied, avoid using affected hardware or modules that trigger the renesas_usbhs driver to reduce the risk of system crashes.