๐Ÿ” CVE Alert

CVE-2025-38252

UNKNOWN 0.0

cxl/ras: Fix CPER handler device confusion

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: cxl/ras: Fix CPER handler device confusion By inspection, cxl_cper_handle_prot_err() is making a series of fragile assumptions that can lead to crashes: 1/ It assumes that endpoints identified in the record are a CXL-type-3 device, nothing guarantees that. 2/ It assumes that the device is bound to the cxl_pci driver, nothing guarantees that. 3/ Minor, it holds the device lock over the switch-port tracing for no reason as the trace is 100% generated from data in the record. Correct those by checking that the PCIe endpoint parents a cxl_memdev before assuming the format of the driver data, and move the lock to where it is required. Consequently this also makes the implementation ready for CXL accelerators that are not bound to cxl_pci.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 9, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
36f257e3b0ba904f5a4e7fa8dafaa60e88cdd28c < 4bcb8dd36e9e3fad6c22862ac5b6993df838309b 36f257e3b0ba904f5a4e7fa8dafaa60e88cdd28c < 3c70ec71abdaf4e4fa48cd8fdfbbd864d78235a8
Linux / Linux
6.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/4bcb8dd36e9e3fad6c22862ac5b6993df838309b git.kernel.org: https://git.kernel.org/stable/c/3c70ec71abdaf4e4fa48cd8fdfbbd864d78235a8