CVE-2025-38053
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a null pointer dereference in the Linux kernel's idpf driver, specifically in the idpf_features_check function. The function validates the TX packet by comparing the skb header length with a hardware-supported value accessed via a vport pointer. During a reset, all vports are released, causing the vport pointer to become NULL. Accessing this NULL pointer leads to a kernel crash (null pointer dereference). The fix involves storing the maximum header length value directly in the netdev private structure to avoid accessing the NULL vport pointer.
How can this vulnerability impact me? :
This vulnerability can cause a kernel NULL pointer dereference, leading to a system crash or denial of service. This can disrupt network operations and potentially affect system stability and availability.