CVE-2025-38413
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's virtio-net driver involves an incorrect length check for received network frames when using XDP sockets (xsk). Specifically, the length of the frame data passed to buf_to_xdp was checked against a size that incorrectly included the virtio header length for the first buffer, which actually should not include it. This mismatch could lead to improper handling of frame lengths. The fix involves differentiating the first buffer from others to correctly calculate the maximum frame length and prevent incorrect length checks.
How can this vulnerability impact me? :
The vulnerability could cause improper processing of network frames in the virtio-net driver, potentially leading to data corruption, crashes, or unexpected behavior in network packet handling. This could affect the stability and reliability of systems using virtio-net with XDP sockets, possibly impacting network performance or security.