CVE-2025-38020
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-12-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.1 (inc) to 6.1.140 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.92 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.30 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.14.8 (exc) |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's network driver for Mellanox devices (mlx5e). Specifically, the MACsec offload feature is not supported in switchdev mode for uplink representors. If the MACsec offload feature is not properly disabled when switching to the uplink representor profile, attempts to add offloads can cause a null pointer dereference, leading to a kernel crash (general protection fault). The issue arises because the feature bit remains set even though the hardware does not support MACsec offload in this mode.
How can this vulnerability impact me? :
If this vulnerability is triggered, it can cause the Linux kernel to crash due to a null pointer dereference. This results in a system crash or instability, potentially causing downtime or loss of network connectivity on affected systems using the mlx5e driver with uplink representor profiles and MACsec offload enabled.