CVE-2025-38522
BaseFortify
Publication date: 2025-08-16
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the function update_locked_rq() being called with a NULL runqueue (rq) pointer. When this happens with preemption enabled, it triggers a warning because __this_cpu_write(), used inside update_locked_rq(), is unsafe in preemptible contexts. The issue arises when operations are invoked from an unlocked context where rq is NULL, but update_locked_rq() is still called. The fix prevents calling update_locked_rq() when rq is NULL, avoiding unsafe operations in preemptible contexts.
How can this vulnerability impact me? :
This vulnerability can cause kernel warnings or potential instability due to unsafe calls in preemptible contexts, which might lead to system crashes or unpredictable behavior in the Linux kernel. It affects the kernel's scheduling operations and could impact system reliability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by preventing calls to update_locked_rq() with a NULL runqueue pointer in the Linux kernel. Immediate mitigation involves updating your Linux kernel to a version that includes this fix, ensuring that update_locked_rq() is only called when the runqueue pointer is non-NULL.