CVE-2025-38233
BaseFortify
Publication date: 2025-07-04
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's powerpc64/ftrace component. During livepatching, the CPU register r15 is clobbered (overwritten) but not restored properly. This leads to kernel crashes or faults, such as 'Unable to handle kernel data access on write' errors and kernel oops messages, due to corrupted register state during livepatch sequences. The fix involves always restoring the r15 register to prevent these failures.
How can this vulnerability impact me? :
This vulnerability can cause kernel crashes or faults during livepatching on powerpc64 systems, potentially leading to system instability, data loss, or downtime. It affects the reliability of the Linux kernel when applying live patches, which could disrupt normal system operations.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by restoring the r15 register during livepatching in the Linux kernel. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.