CVE-2025-38192
BaseFortify
Publication date: 2025-07-04
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.16 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel NULL pointer dereference) when a NAT46 BPF program mishandles packets, leading to potential denial of service on affected systems. This can disrupt network operations and system stability.
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel when a NAT46 BPF program improperly handles network packets by flipping ingress packets from IPv4 to IPv6 without properly clearing the destination (dst) field. This leads to a NULL pointer dereference and kernel crash because the IPv6 receive core tries to use an IPv4 destination that is no longer valid. The issue arises because the protocol is changed to IPv6 but the dst field still references an IPv4 destination, causing the kernel to crash.