CVE-2025-38322
Description
In the Linux kernel, the following vulnerability has been resolved:
perf/x86/intel: Fix crash in icl_update_topdown_event()
The perf_fuzzer found a hard-lockup crash on a RaptorLake machine:
Oops: general protection fault, maybe for address 0xffff89aeceab400: 0000 CPU: 23 UID: 0 PID: 0 Comm: swapper/23 Tainted: [W]=WARN Hardware name: Dell Inc. Precision 9660/0VJ762 RIP: 0010:native_read_pmc+0x7/0x40 Code: cc e8 8d a9 01 00 48 89 03 5b cd cc cc cc cc 0f 1f ... RSP: 000:fffb03100273de8 EFLAGS: 00010046 .... Call Trace:
icl_update_topdown_event+0x165/0x190 ? ktime_get+0x38/0xd0 intel_pmu_read_event+0xf9/0x210 __perf_event_read+0xf9/0x210
CPUs 16-23 are E-core CPUs that don't support the perf metrics feature. The icl_update_topdown_event() should not be invoked on these CPUs.
It's a regression of commit:
f9bdf1f95339 ("perf/x86/intel: Avoid disable PMU if !cpuc->enabled in sample read")
The bug introduced by that commit is that the is_topdown_event() function is mistakenly used to replace the is_topdown_count() call to check if the topdown functions for the perf metrics feature should be invoked.
Fix it.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A bug in the Linux kernel's perf subsystem, introduced by commit f9bdf1f95339, causes a crash on Intel RaptorLake E-cores when topdown event handling is incorrectly invoked.
Vulnerability
Analysis
CVE-2025-38322 is a kernel vulnerability in the Linux perf subsystem affecting Intel processors. The root cause is a logic error introduced by commit f9bdf1f95339, which replaced a correct is_topdown_count() check with is_topdown_event(). This change caused the icl_update_topdown_event() function to be invoked on Intel E-cores (CPUs 16-23 on a RaptorLake machine) that do not support the perf metrics feature, leading to a general protection fault and hard-lockup crash [1][2].
Exploitation and
Impact
An attacker with local access and the ability to trigger perf events (such as via the perf_fuzzer tool) could exploit this vulnerability to cause a denial of service (DoS) by crashing the system. The crash manifests as a hard-lockup on the affected CPU core, requiring a reboot to recover. No special privileges or complex attack chains are needed beyond local user access to the perf subsystem [1][3].
Mitigation
The Linux kernel community has released a fix in the stable kernel tree (commit a85cc69acdcb) that restores the correct is_topdown_count() check, ensuring topdown event handling only occurs on cores that support it [3][4]. The vulnerability is fixed in Linux kernel versions that include this commit. Affected users should update their kernels to the latest stable release. The Siemens advisory (SSA-032379) also lists this CVE as affecting certain industrial products, referencing the kernel fix [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Linux/Linuxv5Range: 6.15
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/702ea6028032d6c1fe96c2d4762a3575e3654819nvdPatch
- git.kernel.org/stable/c/79e2dd573116d3338507c311460da9669095c94dnvdPatch
- git.kernel.org/stable/c/a85cc69acdcb05f8cd226b8ea0778b8e2e887e6fnvdPatch
- git.kernel.org/stable/c/b0823d5fbacb1c551d793cbfe7af24e0d1fa45ednvdPatch
- git.kernel.org/stable/c/e97c45c770f5e56c784a46c2a96ab968d26b97d9nvdPatch
- lists.debian.org/debian-lts-announce/2025/10/msg00008.htmlnvdThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-032379.htmlnvd
News mentions
1- Siemens SIMATICCISA ICS Advisories