CVE-2025-38252
BaseFortify
Publication date: 2025-07-09
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the cxl/ras CPER handler, where the function cxl_cper_handle_prot_err() makes unsafe assumptions about device types and driver bindings. Specifically, it incorrectly assumes that endpoints are always CXL-type-3 devices and that devices are always bound to the cxl_pci driver, which is not guaranteed. These assumptions can lead to crashes. The fix involves verifying the device type more carefully and adjusting locking mechanisms to prevent these crashes and support additional device types like CXL accelerators.
How can this vulnerability impact me? :
This vulnerability can cause system crashes due to incorrect assumptions about device types and driver bindings in the Linux kernel's error handling for CXL devices. Such crashes can lead to system instability or downtime, potentially affecting system reliability and availability.
What immediate steps should I take to mitigate this vulnerability?
Apply the updated Linux kernel patch that fixes the cxl/ras CPER handler device confusion by ensuring proper device type checks and driver bindings as described. This involves updating to a kernel version that includes the fix for cxl_cper_handle_prot_err() to prevent crashes caused by incorrect assumptions about device types and driver bindings.