{"id":"CVE-2025-38298","summary":"EDAC/skx_common: Fix general protection fault","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/skx_common: Fix general protection fault\n\nAfter loading i10nm_edac (which automatically loads skx_edac_common), if\nunload only i10nm_edac, then reload it and perform error injection testing,\na general protection fault may occur:\n\n  mce: [Hardware Error]: Machine check events logged\n  Oops: general protection fault ...\n  ...\n  Workqueue: events mce_gen_pool_process\n  RIP: 0010:string+0x53/0xe0\n  ...\n  Call Trace:\n  \u003cTASK\u003e\n  ? die_addr+0x37/0x90\n  ? exc_general_protection+0x1e7/0x3f0\n  ? asm_exc_general_protection+0x26/0x30\n  ? string+0x53/0xe0\n  vsnprintf+0x23e/0x4c0\n  snprintf+0x4d/0x70\n  skx_adxl_decode+0x16a/0x330 [skx_edac_common]\n  skx_mce_check_error.part.0+0xf8/0x220 [skx_edac_common]\n  skx_mce_check_error+0x17/0x20 [skx_edac_common]\n  ...\n\nThe issue arose was because the variable 'adxl_component_count' (inside\nskx_edac_common), which counts the ADXL components, was not reset. During\nthe reloading of i10nm_edac, the count was incremented by the actual number\nof ADXL components again, resulting in a count that was double the real\nnumber of ADXL components. This led to an out-of-bounds reference to the\nADXL component array, causing the general protection fault above.\n\nFix this issue by resetting the 'adxl_component_count' in adxl_put(),\nwhich is called during the unloading of {skx,i10nm}_edac.","modified":"2026-03-20T12:42:47.403636Z","published":"2025-07-10T07:42:11.553Z","related":["MGASA-2025-0218","MGASA-2025-0219","SUSE-SU-2026:20555-1","SUSE-SU-2026:20599-1","SUSE-SU-2026:20615-1","openSUSE-SU-2026:20287-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38298.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/20d2d476b3ae18041be423671a8637ed5ffd6958"},{"type":"WEB","url":"https://git.kernel.org/stable/c/31ef6f7c9aee3be78d63789653e92350f2537f93"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3f5d0659000923735350da60ad710f8c804544fe"},{"type":"WEB","url":"https://git.kernel.org/stable/c/80bf28fd623d97dd4f4825fbbe9d736cec2afba3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a13e8343ffcff27af1ff79597ff7ba241e6d9471"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a6ed3a6edff09c1187cc6ade7f5967bca2376a13"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bf6a8502a5f4ff6e4d135d795945cdade49ec8b0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e8530ed3c0769a4d8f79c212715ec1cf277787f8"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38298.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38298"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c68d1dbfe381260e8e30880fa6b8e708e57143f6"},{"fixed":"80bf28fd623d97dd4f4825fbbe9d736cec2afba3"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3070e81609169b316e3e3f226456950238338d43"},{"fixed":"a6ed3a6edff09c1187cc6ade7f5967bca2376a13"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2259b26ff45a231579485752bda51acf87c39d18"},{"fixed":"bf6a8502a5f4ff6e4d135d795945cdade49ec8b0"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"6d0d9f0fd13536ed21b9c0dd576ba292f750a1c1"},{"fixed":"e8530ed3c0769a4d8f79c212715ec1cf277787f8"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c25ae63de6805589e954b86020f89065b9eca4d4"},{"fixed":"3f5d0659000923735350da60ad710f8c804544fe"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"123b158635505c89ed0d3ef45c5845ff9030a466"},{"fixed":"a13e8343ffcff27af1ff79597ff7ba241e6d9471"},{"fixed":"31ef6f7c9aee3be78d63789653e92350f2537f93"},{"fixed":"20d2d476b3ae18041be423671a8637ed5ffd6958"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"32700ecf8007e071d1ce4c78f65b85f46d05f32a"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38298.json"}}],"schema_version":"1.7.5"}