CVE-2025-38329

7.1 HIGH

📋 TL;DR

This CVE describes an out-of-bounds memory read vulnerability in the Linux kernel's cs_dsp firmware component, specifically in a KUnit test function. The vulnerability allows reading beyond allocated memory boundaries, potentially exposing sensitive kernel data. It affects Linux systems using the cs_dsp firmware driver.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches exist in stable kernel trees
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in cs_dsp firmware driver's KUnit test code, which may not be enabled in all kernel configurations.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory disclosure leading to information leakage, potential privilege escalation if combined with other vulnerabilities, or system instability/crash.

🟠

Likely Case

Information disclosure of kernel memory contents, potentially exposing sensitive data or causing kernel panics in specific conditions.

🟢

If Mitigated

Limited impact due to being in a test function, but still represents a kernel memory safety violation.

🌐 Internet-Facing: LOW - This is a kernel-level vulnerability requiring local access or existing kernel compromise to trigger.
🏢 Internal Only: MEDIUM - Local users or processes could potentially trigger this to read kernel memory, but exploitation requires specific conditions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering the specific KUnit test with crafted input, and being in a test environment. Real-world exploitation is limited by being in test code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel trees (commits 0000a2303ba78b6424ff15b5085b5f5098750a2e and d979b783d61f7f1f95664031b71a33afc74627b2)

Vendor Advisory: https://git.kernel.org/stable/c/0000a2303ba78b6424ff15b5085b5f5098750a2e

Restart Required: Yes

Instructions:

1. Update to a patched kernel version from your distribution. 2. Apply the specific kernel patches if building custom kernel. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable KUnit testing for cs_dsp

linux

Disable the vulnerable KUnit test module if not needed

modprobe -r cs_dsp_test_module
echo 'blacklist cs_dsp_test' >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Restrict access to users who could trigger kernel tests
  • Monitor for kernel panic logs or unusual memory access patterns

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if cs_dsp KUnit tests are enabled. Use: uname -r and check kernel config for CONFIG_TEST_CS_DSP

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and contains the fix commits. Check: grep -q '0000a2303ba78b6424ff15b5085b5f5098750a2e\|d979b783d61f7f1f95664031b71a33afc74627b2' /proc/version_signature

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • KASAN reports of out-of-bounds access in cs_dsp
  • Unexpected kernel test failures

Network Indicators:

  • None - this is a local kernel vulnerability

SIEM Query:

source="kernel" AND ("KASAN" OR "out-of-bounds" OR "cs_dsp")

🔗 References

📤 Share & Export