
Cloud Vulnerability DB
A community-led vulnerabilities database
A race condition vulnerability was identified in the Linux kernel's coresight subsystem, tracked as CVE-2025-38132. The issue involves improper locking mechanisms while removing cscfg configurations from csdev, specifically related to the handling of cscfg_csdev_lock. This vulnerability was discovered and disclosed on July 3, 2025, affecting the Linux kernel's coresight component (NVD, CVE).
The vulnerability stems from a race condition scenario in the coresight configuration handling. The issue occurs when there's concurrent access between CPU cores during module loading and configuration operations. The race condition manifests when one CPU performs cscfg_load_config_sets() while another CPU attempts to deactivate and unload configurations, potentially leading to unsafe access of the config_csdev_list. According to Rapid7's assessment, the vulnerability has been assigned a CVSS score of 9.0, with attack vector parameters of (AV:N/AC:L/Au:N/C:N/I:C/A:C) (Rapid7).
The race condition could lead to potential system instability or crashes due to concurrent access to the config_csdev_list structure. The high CVSS score of 9.0 indicates that this vulnerability could have serious implications for system integrity and availability (Rapid7).
The recommended fix involves holding the csdev->cscfg_csdev_lock() while executing cscfg_remove_owned_csdev_configs() to prevent the race condition. This ensures proper synchronization during configuration removal operations (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."