CVE-2025-38305
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a recursive locking issue in the Linux kernel's Precision Time Protocol (PTP) subsystem. Specifically, the function ptp_vclock_in_use() checks the ptp->n_vclocks variable while holding a lock (ptp->n_vclocks_mux), but this leads to a recursive lock acquisition and potential deadlock. The fix removes the redundant check of ptp->n_vclocks in ptp_vclock_in_use() because other parts of the code already handle this check safely with proper locking, preventing the recursive locking scenario.
How can this vulnerability impact me? :
This vulnerability can cause a deadlock in the Linux kernel's PTP subsystem, potentially leading to system hangs or crashes when the affected code path is executed. This can impact system stability and reliability, especially in environments relying on precise time synchronization.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is caused by recursive locking due to redundant checks of ptp->n_vclocks in ptp_vclock_in_use(). The immediate mitigation is to update the Linux kernel to a version where this logic has been removed, as the fix involves removing the redundant check for ptp->n_vclocks in ptp_vclock_in_use() to prevent recursive locking. Ensuring that your kernel is patched with this fix will mitigate the issue.