{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-38298","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:24.002Z","datePublished":"2025-07-10T07:42:11.553Z","dateUpdated":"2026-05-11T21:25:16.382Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:25:16.382Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/skx_common: Fix general protection fault\n\nAfter loading i10nm_edac (which automatically loads skx_edac_common), if\nunload only i10nm_edac, then reload it and perform error injection testing,\na general protection fault may occur:\n\n  mce: [Hardware Error]: Machine check events logged\n  Oops: general protection fault ...\n  ...\n  Workqueue: events mce_gen_pool_process\n  RIP: 0010:string+0x53/0xe0\n  ...\n  Call Trace:\n  <TASK>\n  ? die_addr+0x37/0x90\n  ? exc_general_protection+0x1e7/0x3f0\n  ? asm_exc_general_protection+0x26/0x30\n  ? string+0x53/0xe0\n  vsnprintf+0x23e/0x4c0\n  snprintf+0x4d/0x70\n  skx_adxl_decode+0x16a/0x330 [skx_edac_common]\n  skx_mce_check_error.part.0+0xf8/0x220 [skx_edac_common]\n  skx_mce_check_error+0x17/0x20 [skx_edac_common]\n  ...\n\nThe issue arose was because the variable 'adxl_component_count' (inside\nskx_edac_common), which counts the ADXL components, was not reset. During\nthe reloading of i10nm_edac, the count was incremented by the actual number\nof ADXL components again, resulting in a count that was double the real\nnumber of ADXL components. This led to an out-of-bounds reference to the\nADXL component array, causing the general protection fault above.\n\nFix this issue by resetting the 'adxl_component_count' in adxl_put(),\nwhich is called during the unloading of {skx,i10nm}_edac."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/edac/skx_common.c"],"versions":[{"version":"c68d1dbfe381260e8e30880fa6b8e708e57143f6","lessThan":"80bf28fd623d97dd4f4825fbbe9d736cec2afba3","status":"affected","versionType":"git"},{"version":"3070e81609169b316e3e3f226456950238338d43","lessThan":"a6ed3a6edff09c1187cc6ade7f5967bca2376a13","status":"affected","versionType":"git"},{"version":"2259b26ff45a231579485752bda51acf87c39d18","lessThan":"bf6a8502a5f4ff6e4d135d795945cdade49ec8b0","status":"affected","versionType":"git"},{"version":"6d0d9f0fd13536ed21b9c0dd576ba292f750a1c1","lessThan":"e8530ed3c0769a4d8f79c212715ec1cf277787f8","status":"affected","versionType":"git"},{"version":"c25ae63de6805589e954b86020f89065b9eca4d4","lessThan":"3f5d0659000923735350da60ad710f8c804544fe","status":"affected","versionType":"git"},{"version":"123b158635505c89ed0d3ef45c5845ff9030a466","lessThan":"a13e8343ffcff27af1ff79597ff7ba241e6d9471","status":"affected","versionType":"git"},{"version":"123b158635505c89ed0d3ef45c5845ff9030a466","lessThan":"31ef6f7c9aee3be78d63789653e92350f2537f93","status":"affected","versionType":"git"},{"version":"123b158635505c89ed0d3ef45c5845ff9030a466","lessThan":"20d2d476b3ae18041be423671a8637ed5ffd6958","status":"affected","versionType":"git"},{"version":"32700ecf8007e071d1ce4c78f65b85f46d05f32a","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/edac/skx_common.c"],"versions":[{"version":"6.11","status":"affected"},{"version":"0","lessThan":"6.11","status":"unaffected","versionType":"semver"},{"version":"5.4.295","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.239","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.186","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.142","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.94","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.34","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.15.3","lessThanOrEqual":"6.15.*","status":"unaffected","versionType":"semver"},{"version":"6.16","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.282","versionEndExcluding":"5.4.295"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.224","versionEndExcluding":"5.10.239"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.165","versionEndExcluding":"5.15.186"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.103","versionEndExcluding":"6.1.142"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.44","versionEndExcluding":"6.6.94"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.11","versionEndExcluding":"6.12.34"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.11","versionEndExcluding":"6.15.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.11","versionEndExcluding":"6.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10.3"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/80bf28fd623d97dd4f4825fbbe9d736cec2afba3"},{"url":"https://git.kernel.org/stable/c/a6ed3a6edff09c1187cc6ade7f5967bca2376a13"},{"url":"https://git.kernel.org/stable/c/bf6a8502a5f4ff6e4d135d795945cdade49ec8b0"},{"url":"https://git.kernel.org/stable/c/e8530ed3c0769a4d8f79c212715ec1cf277787f8"},{"url":"https://git.kernel.org/stable/c/3f5d0659000923735350da60ad710f8c804544fe"},{"url":"https://git.kernel.org/stable/c/a13e8343ffcff27af1ff79597ff7ba241e6d9471"},{"url":"https://git.kernel.org/stable/c/31ef6f7c9aee3be78d63789653e92350f2537f93"},{"url":"https://git.kernel.org/stable/c/20d2d476b3ae18041be423671a8637ed5ffd6958"}],"title":"EDAC/skx_common: Fix general protection fault","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T17:36:19.762Z"}}]}}