Acknowledged
Created: Aug 17, 2025
Updated: Aug 19, 2025
Found In Version: 10.24.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 24
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]tracing: Add down_write(trace_event_sem) when adding trace event[EOL][EOL]When a module is loaded, it adds trace events defined by the module. It[EOL]may also need to modify the modules trace printk formats to replace enum[EOL]names with their values.[EOL][EOL]If two modules are loaded at the same time, the adding of the event to the[EOL]ftrace_events list can corrupt the walking of the list in the code that is[EOL]modifying the printk format strings and crash the kernel.[EOL][EOL]The addition of the event should take the trace_event_sem for write while[EOL]it adds the new event.[EOL][EOL]Also add a lockdep_assert_held() on that semaphore in[EOL]__trace_add_event_dirs() as it iterates the list.
CREATE(Triage):(User=pbi-cn) [CVE-2025-38539 (https://nvd.nist.gov/vuln/detail/CVE-2025-38539)