CVE-2025-38094

In the Linux kernel, the following vulnerability has been resolved: net: cadence: macb: Fix a possible deadlock in macb_halt_tx. There is a situation where after THALT is set high, TGO stays high as well. Because jiffies are never updated, as we are in a context with interrupts disabled, we never exit that loop and have a deadlock. That deadlock was noticed on a sama5d4 device that stayed locked for days. Use retries instead of jiffies so that the timeout really works and we do not have a deadlock anymore.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Dec 2025, 17:19

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0772a608d799ac0d127c0a36047a2725777aba9d - () https://git.kernel.org/stable/c/0772a608d799ac0d127c0a36047a2725777aba9d - Patch
References () https://git.kernel.org/stable/c/1d60c0781c1bbeaa1196b0d8aad5c435f06cb7c4 - () https://git.kernel.org/stable/c/1d60c0781c1bbeaa1196b0d8aad5c435f06cb7c4 - Patch
References () https://git.kernel.org/stable/c/3e64d35475aa21d13dab71da51de51923c1a3a48 - () https://git.kernel.org/stable/c/3e64d35475aa21d13dab71da51de51923c1a3a48 - Patch
References () https://git.kernel.org/stable/c/64675a9c00443b2e8af42af08c38fc1b78b68ba2 - () https://git.kernel.org/stable/c/64675a9c00443b2e8af42af08c38fc1b78b68ba2 - Patch
References () https://git.kernel.org/stable/c/84f98955a9de0e0f591df85aa1a44f3ebcf1cb37 - () https://git.kernel.org/stable/c/84f98955a9de0e0f591df85aa1a44f3ebcf1cb37 - Patch
References () https://git.kernel.org/stable/c/aace6b63892ce8307e502a60fe2f5a4bc6e1cfe7 - () https://git.kernel.org/stable/c/aace6b63892ce8307e502a60fe2f5a4bc6e1cfe7 - Patch
References () https://git.kernel.org/stable/c/c92d6089d8ad7d4d815ebcedee3f3907b539ff1f - () https://git.kernel.org/stable/c/c92d6089d8ad7d4d815ebcedee3f3907b539ff1f - Patch
References () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-667
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html -

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: cadence: macb: Se corrige un posible interbloqueo en macb_halt_tx. Existe una situación en la que, tras establecerse un valor alto en THALT, TGO también permanece alto. Dado que los jiffies nunca se actualizan, al estar en un contexto con las interrupciones deshabilitadas, nunca salimos de ese bucle y se produce un interbloqueo. Este interbloqueo se detectó en un dispositivo sama5d4 que permaneció bloqueado durante días. Se recomienda usar reintentos en lugar de jiffies para que el tiempo de espera funcione correctamente y se elimine el interbloqueo.

03 Jul 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-03 08:15

Updated : 2025-12-16 17:19


NVD link : CVE-2025-38094

Mitre link : CVE-2025-38094

CVE.ORG link : CVE-2025-38094


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-667

Improper Locking