CVE-2025-38402
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's idpf driver where a function that should return a size value (u32) instead returns an error code (-EOPNOTSUPP) when RSS (Receive Side Scaling) keys are not supported. Because the function returns an error code as a size, it leads to an invalid size value being used, which can cause allocation failures when commands like 'ethtool -x eth0' are run on devices without RSS capabilities.
How can this vulnerability impact me? :
The impact of this vulnerability is that it can cause allocation failures in the Linux kernel when querying RSS keys on devices that do not support RSS. This could lead to errors or failures in network-related operations or tools that rely on this functionality, potentially affecting system stability or network performance.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking devices that do not have RSS capabilities set. The command 'ethtool -x eth0' can be used to observe this condition on the network interface eth0.