CVE-2025-38295
BaseFortify
Publication date: 2025-07-10
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amlogic | meson_ddr_pmu | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's Amlogic DDR PMU driver, specifically in the meson_ddr_pmu_create() function. The function incorrectly uses smp_processor_id(), which assumes that preemption is disabled. However, meson_ddr_pmu_create() can be called in a preemptible context, leading to kernel warnings and potential instability. The issue is fixed by replacing smp_processor_id() with raw_smp_processor_id(), which safely retrieves the CPU ID even when preemption is enabled.
How can this vulnerability impact me? :
This vulnerability can cause kernel warnings and potentially unstable behavior during module loading because the function meson_ddr_pmu_create() uses smp_processor_id() in a context where preemption is allowed. This misuse can lead to kernel warnings and stack traces, which may affect system stability or reliability on affected devices using the Amlogic DDR PMU driver.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the kernel logs for specific warnings related to the use of smp_processor_id() in a preemptible context. You can use the command `dmesg | grep smp_processor_id` or `journalctl -k | grep smp_processor_id` to look for kernel warnings and stack traces similar to those described in the vulnerability, such as messages containing 'BUG: using smp_processor_id() in preemptible' and call traces involving meson_ddr_pmu_create().
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version where the vulnerability is fixed by replacing smp_processor_id() with raw_smp_processor_id() in the meson_ddr_pmu_create() function. Until the update is applied, monitoring kernel logs for the warning and avoiding loading the affected module may help reduce impact.