CVE-2025-38689
BaseFortify
Publication date: 2025-09-04
Last updated on: 2025-11-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's x86/fpu code, specifically in the avx512_status() function. When CONFIG_X86_DEBUG_FPU is enabled, reading /proc/[kthread]/arch_status causes a warning and a NULL pointer dereference because the AVX-512 timestamp code uses x86_task_fpu() without checking if it returns NULL. Kernel threads (PF_KTHREAD) cause x86_task_fpu() to return NULL under this configuration, leading to the issue. The fix involved stopping the output of AVX-512 elapsed time for kernel threads, as the data was invalid for them.
How can this vulnerability impact me? :
This vulnerability can cause a kernel warning and a NULL pointer dereference when accessing certain kernel thread status files, potentially leading to kernel instability or crashes. It affects systems with CONFIG_X86_DEBUG_FPU enabled and could disrupt normal kernel operations involving kernel threads and their floating point unit (FPU) state handling.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by updating the Linux kernel to a version where the fix is applied. The fix involves stopping the output of AVX-512_elapsed_ms for kernel threads to avoid NULL pointer dereference. Therefore, the immediate mitigation step is to apply the kernel update that includes this fix.