CVE-2025-38186
BaseFortify
Publication date: 2025-07-04
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-415 | The product calls free() twice on the same memory address. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the bnxt_en driver where the functions bnxt_ulp_stop() and bnxt_ulp_start() were originally always called in pairs. After a code change, a new function bnxt_ulp_restart() can be called after bnxt_ulp_stop(), which may cause the RoCE driver's suspend method to be invoked twice. This double invocation leads to a second call to bnxt_re_suspend() that crashes the kernel by dereferencing a NULL pointer, causing a kernel NULL pointer dereference bug and system crash.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (NULL pointer dereference) when the affected driver attempts to suspend the device twice. This can lead to system instability, unexpected reboots, or denial of service on systems using the affected bnxt_en driver, potentially disrupting normal operations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for crash messages related to the bnxt_en driver, specifically looking for kernel NULL pointer dereference errors involving bnxt_re_suspend. You can check the system logs using commands like 'dmesg | grep bnxt_re_suspend' or 'journalctl -k | grep bnxt_re_suspend' to identify if the crash has occurred.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix for this vulnerability, which ensures proper handling of the BNXT_EN_FLAG_ULP_STOPPED flag to prevent double invocation of bnxt_ulp_stop()/bnxt_ulp_start(). Until the update is applied, avoid operations that trigger the bnxt_ulp_restart() path or suspend/resume cycles on the affected RoCE driver to reduce the risk of kernel crashes.