VYPR
Medium severity5.5NVD Advisory· Published Jul 10, 2025· Updated May 12, 2026

CVE-2025-38322

CVE-2025-38322

Description

In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel: Fix crash in icl_update_topdown_event()

The perf_fuzzer found a hard-lockup crash on a RaptorLake machine:

Oops: general protection fault, maybe for address 0xffff89aeceab400: 0000 CPU: 23 UID: 0 PID: 0 Comm: swapper/23 Tainted: [W]=WARN Hardware name: Dell Inc. Precision 9660/0VJ762 RIP: 0010:native_read_pmc+0x7/0x40 Code: cc e8 8d a9 01 00 48 89 03 5b cd cc cc cc cc 0f 1f ... RSP: 000:fffb03100273de8 EFLAGS: 00010046 .... Call Trace:

icl_update_topdown_event+0x165/0x190 ? ktime_get+0x38/0xd0 intel_pmu_read_event+0xf9/0x210 __perf_event_read+0xf9/0x210

CPUs 16-23 are E-core CPUs that don't support the perf metrics feature. The icl_update_topdown_event() should not be invoked on these CPUs.

It's a regression of commit:

f9bdf1f95339 ("perf/x86/intel: Avoid disable PMU if !cpuc->enabled in sample read")

The bug introduced by that commit is that the is_topdown_event() function is mistakenly used to replace the is_topdown_count() call to check if the topdown functions for the perf metrics feature should be invoked.

Fix it.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A bug in the Linux kernel's perf subsystem, introduced by commit f9bdf1f95339, causes a crash on Intel RaptorLake E-cores when topdown event handling is incorrectly invoked.

Vulnerability

Analysis

CVE-2025-38322 is a kernel vulnerability in the Linux perf subsystem affecting Intel processors. The root cause is a logic error introduced by commit f9bdf1f95339, which replaced a correct is_topdown_count() check with is_topdown_event(). This change caused the icl_update_topdown_event() function to be invoked on Intel E-cores (CPUs 16-23 on a RaptorLake machine) that do not support the perf metrics feature, leading to a general protection fault and hard-lockup crash [1][2].

Exploitation and

Impact

An attacker with local access and the ability to trigger perf events (such as via the perf_fuzzer tool) could exploit this vulnerability to cause a denial of service (DoS) by crashing the system. The crash manifests as a hard-lockup on the affected CPU core, requiring a reboot to recover. No special privileges or complex attack chains are needed beyond local user access to the perf subsystem [1][3].

Mitigation

The Linux kernel community has released a fix in the stable kernel tree (commit a85cc69acdcb) that restores the correct is_topdown_count() check, ensuring topdown event handling only occurs on cores that support it [3][4]. The vulnerability is fixed in Linux kernel versions that include this commit. Affected users should update their kernels to the latest stable release. The Siemens advisory (SSA-032379) also lists this CVE as affecting certain industrial products, referencing the kernel fix [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

1