CVE-2025-38576

In the Linux kernel, the following vulnerability has been resolved: powerpc/eeh: Make EEH driver device hotplug safe Multiple race conditions existed between the PCIe hotplug driver and the EEH driver, leading to a variety of kernel oopses of the same general nature: <pcie device unplug> <eeh driver trigger> <hotplug removal trigger> <pcie tree reconfiguration> <eeh recovery next step> <oops in EEH driver bus iteration loop> A second class of oops is also seen when the underlying bus disappears during device recovery. Refactor the EEH module to be PCI rescan and remove safe. Also clean up a few minor formatting / readability issues.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

09 Jan 2026, 14:15

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/1010b4c012b0d78dfb9d3132b49aa2ef024a07a7 - () https://git.kernel.org/stable/c/1010b4c012b0d78dfb9d3132b49aa2ef024a07a7 - Patch
References () https://git.kernel.org/stable/c/19d5036e7ad766cf212aebec23b9f1d7924a62bc - () https://git.kernel.org/stable/c/19d5036e7ad766cf212aebec23b9f1d7924a62bc - Patch
References () https://git.kernel.org/stable/c/502f08831a9afb72dc98a56ae6504da43e93b250 - () https://git.kernel.org/stable/c/502f08831a9afb72dc98a56ae6504da43e93b250 - Patch
References () https://git.kernel.org/stable/c/59c6d3d81d42bf543c90597b4f38c53d6874c5a1 - () https://git.kernel.org/stable/c/59c6d3d81d42bf543c90597b4f38c53d6874c5a1 - Patch
References () https://git.kernel.org/stable/c/a426e8a6ae161f51888585b065db0f8f93ab2e16 - () https://git.kernel.org/stable/c/a426e8a6ae161f51888585b065db0f8f93ab2e16 - Patch
References () https://git.kernel.org/stable/c/d2c60a8a387e9fcc28447ef36c03f8e49fd052a6 - () https://git.kernel.org/stable/c/d2c60a8a387e9fcc28447ef36c03f8e49fd052a6 - Patch
References () https://git.kernel.org/stable/c/d42bbd8f30ac38b1ce54715bf08ec3dac18d6b25 - () https://git.kernel.org/stable/c/d42bbd8f30ac38b1ce54715bf08ec3dac18d6b25 - Patch
References () https://git.kernel.org/stable/c/f56e004b781719d8fdf6c9619b15caf2579bc1f2 - () https://git.kernel.org/stable/c/f56e004b781719d8fdf6c9619b15caf2579bc1f2 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

28 Aug 2025, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/502f08831a9afb72dc98a56ae6504da43e93b250 -
  • () https://git.kernel.org/stable/c/f56e004b781719d8fdf6c9619b15caf2579bc1f2 -

20 Aug 2025, 14:40

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/eeh: Hacer que el dispositivo del controlador EEH sea seguro para la conexión en caliente. Existían múltiples condiciones de ejecución entre el controlador PCIe de conexión en caliente y el controlador EEH, lo que provocaba diversos errores del kernel de la misma naturaleza general: . También se observa un segundo tipo de error cuando el bus subyacente desaparece durante la recuperación del dispositivo. Refactorice el módulo EEH para que sea seguro para la reexploración y la extracción de PCI. También corrija algunos problemas menores de formato y legibilidad.

19 Aug 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-19 17:15

Updated : 2026-01-09 14:15


NVD link : CVE-2025-38576

Mitre link : CVE-2025-38576

CVE.ORG link : CVE-2025-38576


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel