CVE-2025-39722
BaseFortify
Publication date: 2025-09-05
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a flaw in the Linux kernel's crypto CAAM driver for certain iMX8 SoCs (iMX8QM and iMX8ULP). The issue occurs because the CAAM hardware is managed by a separate ARM core (SECO or Secure Enclave), which reserves access to register page 0. The kernel's suspend operations incorrectly attempt to access this reserved page, causing a crash. The fix involves tracking whether page 0 is reserved by introducing a new state variable and preventing suspend operations from touching this page, thus avoiding the crash.
How can this vulnerability impact me? :
If your system uses the affected Linux kernel on iMX8QM or iMX8ULP SoCs, this vulnerability can cause the system to crash during suspend operations. This can lead to system instability, unexpected reboots, or loss of data during power management events.