CVE-2025-38298

In the Linux kernel, the following vulnerability has been resolved: EDAC/skx_common: Fix general protection fault After loading i10nm_edac (which automatically loads skx_edac_common), if unload only i10nm_edac, then reload it and perform error injection testing, a general protection fault may occur: mce: [Hardware Error]: Machine check events logged Oops: general protection fault ... ... Workqueue: events mce_gen_pool_process RIP: 0010:string+0x53/0xe0 ... Call Trace: <TASK> ? die_addr+0x37/0x90 ? exc_general_protection+0x1e7/0x3f0 ? asm_exc_general_protection+0x26/0x30 ? string+0x53/0xe0 vsnprintf+0x23e/0x4c0 snprintf+0x4d/0x70 skx_adxl_decode+0x16a/0x330 [skx_edac_common] skx_mce_check_error.part.0+0xf8/0x220 [skx_edac_common] skx_mce_check_error+0x17/0x20 [skx_edac_common] ... The issue arose was because the variable 'adxl_component_count' (inside skx_edac_common), which counts the ADXL components, was not reset. During the reloading of i10nm_edac, the count was incremented by the actual number of ADXL components again, resulting in a count that was double the real number of ADXL components. This led to an out-of-bounds reference to the ADXL component array, causing the general protection fault above. Fix this issue by resetting the 'adxl_component_count' in adxl_put(), which is called during the unloading of {skx,i10nm}_edac.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

19 Dec 2025, 17:51

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-787
References () https://git.kernel.org/stable/c/20d2d476b3ae18041be423671a8637ed5ffd6958 - () https://git.kernel.org/stable/c/20d2d476b3ae18041be423671a8637ed5ffd6958 - Patch
References () https://git.kernel.org/stable/c/31ef6f7c9aee3be78d63789653e92350f2537f93 - () https://git.kernel.org/stable/c/31ef6f7c9aee3be78d63789653e92350f2537f93 - Patch
References () https://git.kernel.org/stable/c/3f5d0659000923735350da60ad710f8c804544fe - () https://git.kernel.org/stable/c/3f5d0659000923735350da60ad710f8c804544fe - Patch
References () https://git.kernel.org/stable/c/80bf28fd623d97dd4f4825fbbe9d736cec2afba3 - () https://git.kernel.org/stable/c/80bf28fd623d97dd4f4825fbbe9d736cec2afba3 - Patch
References () https://git.kernel.org/stable/c/a13e8343ffcff27af1ff79597ff7ba241e6d9471 - () https://git.kernel.org/stable/c/a13e8343ffcff27af1ff79597ff7ba241e6d9471 - Patch
References () https://git.kernel.org/stable/c/a6ed3a6edff09c1187cc6ade7f5967bca2376a13 - () https://git.kernel.org/stable/c/a6ed3a6edff09c1187cc6ade7f5967bca2376a13 - Patch
References () https://git.kernel.org/stable/c/bf6a8502a5f4ff6e4d135d795945cdade49ec8b0 - () https://git.kernel.org/stable/c/bf6a8502a5f4ff6e4d135d795945cdade49ec8b0 - Patch
References () https://git.kernel.org/stable/c/e8530ed3c0769a4d8f79c212715ec1cf277787f8 - () https://git.kernel.org/stable/c/e8530ed3c0769a4d8f79c212715ec1cf277787f8 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

10 Jul 2025, 13:17

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: EDAC/skx_common: Corregir fallo de protección general Después de cargar i10nm_edac (que carga automáticamente skx_edac_common), si solo se descarga i10nm_edac, luego se vuelve a cargar y se realizan pruebas de inyección de errores, puede ocurrir un fallo de protección general: mce: [Error de hardware]: Se registraron eventos de comprobación de la máquina Oops: fallo de protección general ... ... Cola de trabajo: eventos mce_gen_pool_process RIP: 0010:string+0x53/0xe0 ... Rastreo de llamadas: ? die_addr+0x37/0x90 ? exc_general_protection+0x1e7/0x3f0 ? asm_exc_general_protection+0x26/0x30 ? string+0x53/0xe0 vsnprintf+0x23e/0x4c0 snprintf+0x4d/0x70 skx_adxl_decode+0x16a/0x330 [skx_edac_common] skx_mce_check_error.part.0+0xf8/0x220 [skx_edac_common] skx_mce_check_error+0x17/0x20 [skx_edac_common] ... El problema surgió porque la variable 'adxl_component_count' (dentro de skx_edac_common), que cuenta los componentes ADXL, no se restableció. Durante la recarga de i10nm_edac, el recuento se incrementó de nuevo según el número real de componentes ADXL, lo que resultó en un recuento que duplicó el número real de componentes ADXL. Esto provocó una referencia fuera de los límites a la matriz de componentes ADXL, lo que provocó el fallo de protección general mencionado anteriormente. Solucione este problema restableciendo 'adxl_component_count' en adxl_put(), que se llama durante la descarga de {skx,i10nm}_edac.

10 Jul 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-10 08:15

Updated : 2025-12-19 17:51


NVD link : CVE-2025-38298

Mitre link : CVE-2025-38298

CVE.ORG link : CVE-2025-38298


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write