We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38252

cxl/ras: Fix CPER handler device confusion



Description

In the Linux kernel, the following vulnerability has been resolved: cxl/ras: Fix CPER handler device confusion By inspection, cxl_cper_handle_prot_err() is making a series of fragile assumptions that can lead to crashes: 1/ It assumes that endpoints identified in the record are a CXL-type-3 device, nothing guarantees that. 2/ It assumes that the device is bound to the cxl_pci driver, nothing guarantees that. 3/ Minor, it holds the device lock over the switch-port tracing for no reason as the trace is 100% generated from data in the record. Correct those by checking that the PCIe endpoint parents a cxl_memdev before assuming the format of the driver data, and move the lock to where it is required. Consequently this also makes the implementation ready for CXL accelerators that are not bound to cxl_pci.

Reserved 2025-04-16 | Published 2025-07-09 | Updated 2025-07-09 | Assigner Linux

Product status

Default status
unaffected

36f257e3b0ba904f5a4e7fa8dafaa60e88cdd28c before 4bcb8dd36e9e3fad6c22862ac5b6993df838309b
affected

36f257e3b0ba904f5a4e7fa8dafaa60e88cdd28c before 3c70ec71abdaf4e4fa48cd8fdfbbd864d78235a8
affected

Default status
affected

6.15
affected

Any version before 6.15
unaffected

6.15.5
unaffected

6.16-rc4
unaffected

References

git.kernel.org/...c/4bcb8dd36e9e3fad6c22862ac5b6993df838309b

git.kernel.org/...c/3c70ec71abdaf4e4fa48cd8fdfbbd864d78235a8

cve.org (CVE-2025-38252)

nvd.nist.gov (CVE-2025-38252)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38252

Support options

Helpdesk Chat, Email, Knowledgebase