CVE-2025-38720

In the Linux kernel, the following vulnerability has been resolved: net: hibmcge: fix rtnl deadlock issue Currently, the hibmcge netdev acquires the rtnl_lock in pci_error_handlers.reset_prepare() and releases it in pci_error_handlers.reset_done(). However, in the PCI framework: pci_reset_bus - __pci_reset_slot - pci_slot_save_and_disable_locked - pci_dev_save_and_disable - err_handler->reset_prepare(dev); In pci_slot_save_and_disable_locked(): list_for_each_entry(dev, &slot->bus->devices, bus_list) { if (!dev->slot || dev->slot!= slot) continue; pci_dev_save_and_disable(dev); if (dev->subordinate) pci_bus_save_and_disable_locked(dev->subordinate); } This will iterate through all devices under the current bus and execute err_handler->reset_prepare(), causing two devices of the hibmcge driver to sequentially request the rtnl_lock, leading to a deadlock. Since the driver now executes netif_device_detach() before the reset process, it will not concurrently with other netdev APIs, so there is no need to hold the rtnl_lock now. Therefore, this patch removes the rtnl_lock during the reset process and adjusts the position of HBG_NIC_STATE_RESETTING to ensure that multiple resets are not executed concurrently.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*

History

25 Nov 2025, 21:47

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/1343a8994ca7dba78f5dd818e89d68331c21c35d - () https://git.kernel.org/stable/c/1343a8994ca7dba78f5dd818e89d68331c21c35d - Patch
References () https://git.kernel.org/stable/c/c875503a9b9082928d7d3fc60b5400d16fbfae4e - () https://git.kernel.org/stable/c/c875503a9b9082928d7d3fc60b5400d16fbfae4e - Patch
References () https://git.kernel.org/stable/c/d85a6346fd6f595c4914205762d0cdf35c004a5e - () https://git.kernel.org/stable/c/d85a6346fd6f595c4914205762d0cdf35c004a5e - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-667

Information

Published : 2025-09-04 16:15

Updated : 2025-11-25 21:47


NVD link : CVE-2025-38720

Mitre link : CVE-2025-38720

CVE.ORG link : CVE-2025-38720


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking