CVE-2025-38385
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-12-16
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.17 (inc) to 6.1.144 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.97 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.37 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.6 (exc) |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-404 | The product does not release or incorrectly releases a resource before it is made available for re-use. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's handling of USB network devices using the lan78xx driver. Specifically, a redundant call to netif_napi_del() occurs during the USB device disconnect process while NAPI (New API for network packet processing) is still enabled. This redundant call triggers a warning in the kernel (__netif_napi_del_locked), which is unnecessary because the unregister_netdev() function already safely handles NAPI teardown. The fix removes this redundant call to prevent the warning from being triggered.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily related to system stability and kernel warnings. The redundant call causes a kernel warning during USB network device disconnect, which could lead to confusion during debugging or system monitoring. However, there is no indication that this causes a security breach or system compromise. It mainly affects the reliability and cleanliness of the kernel's operation when disconnecting USB network devices.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for the specific warning message triggered during USB device disconnects. Look for kernel warnings similar to: 'WARNING: CPU: ... at net/core/dev.c:7417 __netif_napi_del_locked'. You can use commands like 'dmesg | grep __netif_napi_del_locked' or 'journalctl -k | grep __netif_napi_del_locked' to find these warnings in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the redundant netif_napi_del() call in the lan78xx USB network driver disconnect path has been removed. This fix prevents the WARN from being triggered by relying on unregister_netdev() to handle NAPI teardown safely. Until the update is applied, monitor for the warning and avoid disconnecting affected USB network devices unnecessarily.