CVE-2025-38298 (GCVE-0-2025-38298)
Vulnerability from cvelistv5
Published
2025-07-10 07:42
Modified
2025-07-28 04:17
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: EDAC/skx_common: Fix general protection fault After loading i10nm_edac (which automatically loads skx_edac_common), if unload only i10nm_edac, then reload it and perform error injection testing, a general protection fault may occur: mce: [Hardware Error]: Machine check events logged Oops: general protection fault ... ... Workqueue: events mce_gen_pool_process RIP: 0010:string+0x53/0xe0 ... Call Trace: <TASK> ? die_addr+0x37/0x90 ? exc_general_protection+0x1e7/0x3f0 ? asm_exc_general_protection+0x26/0x30 ? string+0x53/0xe0 vsnprintf+0x23e/0x4c0 snprintf+0x4d/0x70 skx_adxl_decode+0x16a/0x330 [skx_edac_common] skx_mce_check_error.part.0+0xf8/0x220 [skx_edac_common] skx_mce_check_error+0x17/0x20 [skx_edac_common] ... The issue arose was because the variable 'adxl_component_count' (inside skx_edac_common), which counts the ADXL components, was not reset. During the reloading of i10nm_edac, the count was incremented by the actual number of ADXL components again, resulting in a count that was double the real number of ADXL components. This led to an out-of-bounds reference to the ADXL component array, causing the general protection fault above. Fix this issue by resetting the 'adxl_component_count' in adxl_put(), which is called during the unloading of {skx,i10nm}_edac.
Impacted products
Vendor Product Version
Linux Linux Version: c68d1dbfe381260e8e30880fa6b8e708e57143f6
Version: 3070e81609169b316e3e3f226456950238338d43
Version: 2259b26ff45a231579485752bda51acf87c39d18
Version: 6d0d9f0fd13536ed21b9c0dd576ba292f750a1c1
Version: c25ae63de6805589e954b86020f89065b9eca4d4
Version: 123b158635505c89ed0d3ef45c5845ff9030a466
Version: 123b158635505c89ed0d3ef45c5845ff9030a466
Version: 123b158635505c89ed0d3ef45c5845ff9030a466
Version: 32700ecf8007e071d1ce4c78f65b85f46d05f32a
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/edac/skx_common.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "80bf28fd623d97dd4f4825fbbe9d736cec2afba3",
              "status": "affected",
              "version": "c68d1dbfe381260e8e30880fa6b8e708e57143f6",
              "versionType": "git"
            },
            {
              "lessThan": "a6ed3a6edff09c1187cc6ade7f5967bca2376a13",
              "status": "affected",
              "version": "3070e81609169b316e3e3f226456950238338d43",
              "versionType": "git"
            },
            {
              "lessThan": "bf6a8502a5f4ff6e4d135d795945cdade49ec8b0",
              "status": "affected",
              "version": "2259b26ff45a231579485752bda51acf87c39d18",
              "versionType": "git"
            },
            {
              "lessThan": "e8530ed3c0769a4d8f79c212715ec1cf277787f8",
              "status": "affected",
              "version": "6d0d9f0fd13536ed21b9c0dd576ba292f750a1c1",
              "versionType": "git"
            },
            {
              "lessThan": "3f5d0659000923735350da60ad710f8c804544fe",
              "status": "affected",
              "version": "c25ae63de6805589e954b86020f89065b9eca4d4",
              "versionType": "git"
            },
            {
              "lessThan": "a13e8343ffcff27af1ff79597ff7ba241e6d9471",
              "status": "affected",
              "version": "123b158635505c89ed0d3ef45c5845ff9030a466",
              "versionType": "git"
            },
            {
              "lessThan": "31ef6f7c9aee3be78d63789653e92350f2537f93",
              "status": "affected",
              "version": "123b158635505c89ed0d3ef45c5845ff9030a466",
              "versionType": "git"
            },
            {
              "lessThan": "20d2d476b3ae18041be423671a8637ed5ffd6958",
              "status": "affected",
              "version": "123b158635505c89ed0d3ef45c5845ff9030a466",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "32700ecf8007e071d1ce4c78f65b85f46d05f32a",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/edac/skx_common.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.11"
            },
            {
              "lessThan": "6.11",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.295",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.239",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.186",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.142",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.94",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.34",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.15.*",
              "status": "unaffected",
              "version": "6.15.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.16",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.295",
                  "versionStartIncluding": "5.4.282",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.239",
                  "versionStartIncluding": "5.10.224",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.186",
                  "versionStartIncluding": "5.15.165",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.142",
                  "versionStartIncluding": "6.1.103",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.94",
                  "versionStartIncluding": "6.6.44",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.34",
                  "versionStartIncluding": "6.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.15.3",
                  "versionStartIncluding": "6.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.16",
                  "versionStartIncluding": "6.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.10.3",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/skx_common: Fix general protection fault\n\nAfter loading i10nm_edac (which automatically loads skx_edac_common), if\nunload only i10nm_edac, then reload it and perform error injection testing,\na general protection fault may occur:\n\n  mce: [Hardware Error]: Machine check events logged\n  Oops: general protection fault ...\n  ...\n  Workqueue: events mce_gen_pool_process\n  RIP: 0010:string+0x53/0xe0\n  ...\n  Call Trace:\n  \u003cTASK\u003e\n  ? die_addr+0x37/0x90\n  ? exc_general_protection+0x1e7/0x3f0\n  ? asm_exc_general_protection+0x26/0x30\n  ? string+0x53/0xe0\n  vsnprintf+0x23e/0x4c0\n  snprintf+0x4d/0x70\n  skx_adxl_decode+0x16a/0x330 [skx_edac_common]\n  skx_mce_check_error.part.0+0xf8/0x220 [skx_edac_common]\n  skx_mce_check_error+0x17/0x20 [skx_edac_common]\n  ...\n\nThe issue arose was because the variable \u0027adxl_component_count\u0027 (inside\nskx_edac_common), which counts the ADXL components, was not reset. During\nthe reloading of i10nm_edac, the count was incremented by the actual number\nof ADXL components again, resulting in a count that was double the real\nnumber of ADXL components. This led to an out-of-bounds reference to the\nADXL component array, causing the general protection fault above.\n\nFix this issue by resetting the \u0027adxl_component_count\u0027 in adxl_put(),\nwhich is called during the unloading of {skx,i10nm}_edac."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-28T04:17:51.544Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/80bf28fd623d97dd4f4825fbbe9d736cec2afba3"
        },
        {
          "url": "https://git.kernel.org/stable/c/a6ed3a6edff09c1187cc6ade7f5967bca2376a13"
        },
        {
          "url": "https://git.kernel.org/stable/c/bf6a8502a5f4ff6e4d135d795945cdade49ec8b0"
        },
        {
          "url": "https://git.kernel.org/stable/c/e8530ed3c0769a4d8f79c212715ec1cf277787f8"
        },
        {
          "url": "https://git.kernel.org/stable/c/3f5d0659000923735350da60ad710f8c804544fe"
        },
        {
          "url": "https://git.kernel.org/stable/c/a13e8343ffcff27af1ff79597ff7ba241e6d9471"
        },
        {
          "url": "https://git.kernel.org/stable/c/31ef6f7c9aee3be78d63789653e92350f2537f93"
        },
        {
          "url": "https://git.kernel.org/stable/c/20d2d476b3ae18041be423671a8637ed5ffd6958"
        }
      ],
      "title": "EDAC/skx_common: Fix general protection fault",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-38298",
    "datePublished": "2025-07-10T07:42:11.553Z",
    "dateReserved": "2025-04-16T04:51:24.002Z",
    "dateUpdated": "2025-07-28T04:17:51.544Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-38298\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-07-10T08:15:28.500\",\"lastModified\":\"2025-07-10T13:17:30.017\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nEDAC/skx_common: Fix general protection fault\\n\\nAfter loading i10nm_edac (which automatically loads skx_edac_common), if\\nunload only i10nm_edac, then reload it and perform error injection testing,\\na general protection fault may occur:\\n\\n  mce: [Hardware Error]: Machine check events logged\\n  Oops: general protection fault ...\\n  ...\\n  Workqueue: events mce_gen_pool_process\\n  RIP: 0010:string+0x53/0xe0\\n  ...\\n  Call Trace:\\n  \u003cTASK\u003e\\n  ? die_addr+0x37/0x90\\n  ? exc_general_protection+0x1e7/0x3f0\\n  ? asm_exc_general_protection+0x26/0x30\\n  ? string+0x53/0xe0\\n  vsnprintf+0x23e/0x4c0\\n  snprintf+0x4d/0x70\\n  skx_adxl_decode+0x16a/0x330 [skx_edac_common]\\n  skx_mce_check_error.part.0+0xf8/0x220 [skx_edac_common]\\n  skx_mce_check_error+0x17/0x20 [skx_edac_common]\\n  ...\\n\\nThe issue arose was because the variable \u0027adxl_component_count\u0027 (inside\\nskx_edac_common), which counts the ADXL components, was not reset. During\\nthe reloading of i10nm_edac, the count was incremented by the actual number\\nof ADXL components again, resulting in a count that was double the real\\nnumber of ADXL components. This led to an out-of-bounds reference to the\\nADXL component array, causing the general protection fault above.\\n\\nFix this issue by resetting the \u0027adxl_component_count\u0027 in adxl_put(),\\nwhich is called during the unloading of {skx,i10nm}_edac.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: EDAC/skx_common: Corregir fallo de protecci\u00f3n general Despu\u00e9s de cargar i10nm_edac (que carga autom\u00e1ticamente skx_edac_common), si solo se descarga i10nm_edac, luego se vuelve a cargar y se realizan pruebas de inyecci\u00f3n de errores, puede ocurrir un fallo de protecci\u00f3n general: mce: [Error de hardware]: Se registraron eventos de comprobaci\u00f3n de la m\u00e1quina Oops: fallo de protecci\u00f3n general ... ... Cola de trabajo: eventos mce_gen_pool_process RIP: 0010:string+0x53/0xe0 ... Rastreo de llamadas:  ? die_addr+0x37/0x90 ? exc_general_protection+0x1e7/0x3f0 ? asm_exc_general_protection+0x26/0x30 ? string+0x53/0xe0 vsnprintf+0x23e/0x4c0 snprintf+0x4d/0x70 skx_adxl_decode+0x16a/0x330 [skx_edac_common] skx_mce_check_error.part.0+0xf8/0x220 [skx_edac_common] skx_mce_check_error+0x17/0x20 [skx_edac_common] ... El problema surgi\u00f3 porque la variable \u0027adxl_component_count\u0027 (dentro de skx_edac_common), que cuenta los componentes ADXL, no se restableci\u00f3. Durante la recarga de i10nm_edac, el recuento se increment\u00f3 de nuevo seg\u00fan el n\u00famero real de componentes ADXL, lo que result\u00f3 en un recuento que duplic\u00f3 el n\u00famero real de componentes ADXL. Esto provoc\u00f3 una referencia fuera de los l\u00edmites a la matriz de componentes ADXL, lo que provoc\u00f3 el fallo de protecci\u00f3n general mencionado anteriormente. Solucione este problema restableciendo \u0027adxl_component_count\u0027 en adxl_put(), que se llama durante la descarga de {skx,i10nm}_edac.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/20d2d476b3ae18041be423671a8637ed5ffd6958\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/31ef6f7c9aee3be78d63789653e92350f2537f93\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3f5d0659000923735350da60ad710f8c804544fe\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/80bf28fd623d97dd4f4825fbbe9d736cec2afba3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a13e8343ffcff27af1ff79597ff7ba241e6d9471\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a6ed3a6edff09c1187cc6ade7f5967bca2376a13\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bf6a8502a5f4ff6e4d135d795945cdade49ec8b0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e8530ed3c0769a4d8f79c212715ec1cf277787f8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…