CVE-2025-38264
BaseFortify
Publication date: 2025-07-09
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's nvme-tcp module involves improper handling of request lists. Specifically, the function nvme_tcp_handle_r2t() did not properly validate requests to ensure they were not already part of any list. This flaw could allow a malicious R2T PDU (Protocol Data Unit) to inject a loop in the request list processing, potentially causing unexpected behavior or resource issues.
How can this vulnerability impact me? :
The vulnerability could allow an attacker to disrupt the normal processing of NVMe over TCP requests by injecting loops in the request list. This might lead to denial of service or instability in systems using the affected Linux kernel nvme-tcp implementation.