CVE-2025-38479: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: dmaengine: fsl-edma: free irq correctly in remove path Add fsl_edma->txirq/errirq check to avoid below warning because no errirq at i.MX9 platform. Otherwise there will be kernel dump: WARNING: CPU: 0 PID: 11 at kernel/irq/devres.c:144 devm_free_irq+0x74/0x80 Modules linked in: CPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.12.0-rc7#18 Hardware name: NXP i.MX93 11X11 EVK board (DT) Workqueue: events_unbound deferred_probe_work_func pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : devm_free_irq+0x74/0x80 lr : devm_free_irq+0x48/0x80 Call trace: devm_free_irq+0x74/0x80 (P) devm_free_irq+0x48/0x80 (L) fsl_edma_remove+0xc4/0xc8 platform_remove+0x28/0x44 device_remove+0x4c/0x80
AI Analysis
Technical Summary
CVE-2025-38479 is a vulnerability identified in the Linux kernel specifically related to the dmaengine subsystem's fsl-edma driver, which is used for managing DMA (Direct Memory Access) operations on certain Freescale/NXP i.MX platforms. The issue arises from improper handling of IRQ (Interrupt Request) freeing during the device removal process. The vulnerability is due to the absence of a check for the presence of error IRQs (errirq) on the i.MX9 platform, which leads to the Linux kernel attempting to free an IRQ that does not exist. This results in a kernel warning and ultimately a kernel dump (crash), as indicated by the warning message and call trace logs. The problem manifests during the removal path of the fsl-edma driver when devm_free_irq is called without verifying if the errirq is valid, causing instability and potential denial of service (DoS) conditions on affected systems. The vulnerability affects Linux kernel versions around 6.12.0-rc7 and is specifically tied to hardware platforms using the NXP i.MX93 SoC. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The fix involves adding a conditional check to ensure that the errirq is only freed if it exists, preventing the kernel from attempting to free a non-existent IRQ and thus avoiding the kernel dump.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential for system instability or denial of service on devices running affected Linux kernels with the fsl-edma driver, particularly those using NXP i.MX9 series hardware. This could affect embedded systems, industrial control systems, IoT devices, and specialized hardware platforms that rely on these SoCs. The kernel crash could disrupt critical operations, especially in sectors such as manufacturing, automotive, telecommunications, and infrastructure where embedded Linux devices are prevalent. While this vulnerability does not directly lead to privilege escalation or data leakage, the resulting denial of service could cause operational downtime, impacting business continuity and safety-critical processes. Since the vulnerability is hardware and driver specific, its impact is limited to environments using the affected platforms. European organizations deploying embedded Linux systems in industrial or edge computing contexts should be particularly vigilant. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted triggering of the kernel crash.
Mitigation Recommendations
To mitigate CVE-2025-38479, organizations should: 1) Apply the official Linux kernel patches that add the necessary checks for errirq presence before freeing IRQs in the fsl-edma driver. This requires updating to a fixed kernel version or backporting the patch if using long-term support kernels. 2) Identify and inventory all devices running affected Linux kernel versions on NXP i.MX9 platforms, focusing on embedded and industrial systems. 3) Test kernel updates in controlled environments to ensure compatibility and stability before deployment. 4) Implement monitoring for kernel warnings and crashes related to devm_free_irq and fsl-edma to detect potential exploitation or accidental triggering. 5) Where immediate patching is not feasible, consider isolating affected devices from critical networks to reduce the risk of remote triggering. 6) Engage with hardware and software vendors for firmware or driver updates that incorporate the fix. 7) Maintain robust backup and recovery procedures to minimize downtime impact in case of kernel crashes. These steps go beyond generic advice by focusing on embedded Linux environments and the specific hardware affected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland
CVE-2025-38479: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: dmaengine: fsl-edma: free irq correctly in remove path Add fsl_edma->txirq/errirq check to avoid below warning because no errirq at i.MX9 platform. Otherwise there will be kernel dump: WARNING: CPU: 0 PID: 11 at kernel/irq/devres.c:144 devm_free_irq+0x74/0x80 Modules linked in: CPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.12.0-rc7#18 Hardware name: NXP i.MX93 11X11 EVK board (DT) Workqueue: events_unbound deferred_probe_work_func pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : devm_free_irq+0x74/0x80 lr : devm_free_irq+0x48/0x80 Call trace: devm_free_irq+0x74/0x80 (P) devm_free_irq+0x48/0x80 (L) fsl_edma_remove+0xc4/0xc8 platform_remove+0x28/0x44 device_remove+0x4c/0x80
AI-Powered Analysis
Technical Analysis
CVE-2025-38479 is a vulnerability identified in the Linux kernel specifically related to the dmaengine subsystem's fsl-edma driver, which is used for managing DMA (Direct Memory Access) operations on certain Freescale/NXP i.MX platforms. The issue arises from improper handling of IRQ (Interrupt Request) freeing during the device removal process. The vulnerability is due to the absence of a check for the presence of error IRQs (errirq) on the i.MX9 platform, which leads to the Linux kernel attempting to free an IRQ that does not exist. This results in a kernel warning and ultimately a kernel dump (crash), as indicated by the warning message and call trace logs. The problem manifests during the removal path of the fsl-edma driver when devm_free_irq is called without verifying if the errirq is valid, causing instability and potential denial of service (DoS) conditions on affected systems. The vulnerability affects Linux kernel versions around 6.12.0-rc7 and is specifically tied to hardware platforms using the NXP i.MX93 SoC. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The fix involves adding a conditional check to ensure that the errirq is only freed if it exists, preventing the kernel from attempting to free a non-existent IRQ and thus avoiding the kernel dump.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential for system instability or denial of service on devices running affected Linux kernels with the fsl-edma driver, particularly those using NXP i.MX9 series hardware. This could affect embedded systems, industrial control systems, IoT devices, and specialized hardware platforms that rely on these SoCs. The kernel crash could disrupt critical operations, especially in sectors such as manufacturing, automotive, telecommunications, and infrastructure where embedded Linux devices are prevalent. While this vulnerability does not directly lead to privilege escalation or data leakage, the resulting denial of service could cause operational downtime, impacting business continuity and safety-critical processes. Since the vulnerability is hardware and driver specific, its impact is limited to environments using the affected platforms. European organizations deploying embedded Linux systems in industrial or edge computing contexts should be particularly vigilant. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted triggering of the kernel crash.
Mitigation Recommendations
To mitigate CVE-2025-38479, organizations should: 1) Apply the official Linux kernel patches that add the necessary checks for errirq presence before freeing IRQs in the fsl-edma driver. This requires updating to a fixed kernel version or backporting the patch if using long-term support kernels. 2) Identify and inventory all devices running affected Linux kernel versions on NXP i.MX9 platforms, focusing on embedded and industrial systems. 3) Test kernel updates in controlled environments to ensure compatibility and stability before deployment. 4) Implement monitoring for kernel warnings and crashes related to devm_free_irq and fsl-edma to detect potential exploitation or accidental triggering. 5) Where immediate patching is not feasible, consider isolating affected devices from critical networks to reduce the risk of remote triggering. 6) Engage with hardware and software vendors for firmware or driver updates that incorporate the fix. 7) Maintain robust backup and recovery procedures to minimize downtime impact in case of kernel crashes. These steps go beyond generic advice by focusing on embedded Linux environments and the specific hardware affected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:24.021Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9832c4522896dcbe84df
Added to database: 5/21/2025, 9:09:06 AM
Last enriched: 7/3/2025, 7:28:28 PM
Last updated: 8/16/2025, 1:06:15 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.