CVE-2025-38440
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-362 | The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix which calls synchronize_net() before freeing the DIM context. This ensures all in-progress NAPI callbacks are finished before the pointer is cleared, preventing the NULL pointer dereference. Until an update is applied, monitor kernel logs for crashes and consider disabling affected network drivers if feasible.
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's mlx5e network driver related to disabling Dynamic Interrupt Moderation (DIM) and NAPI callbacks. When DIM is disabled, there is a timing issue where NAPI may still see the DIM pointer as valid, but it could have already been set to NULL, causing a NULL pointer dereference in the net_dim() function. This can lead to kernel crashes. The fix involves ensuring all in-progress NAPI callbacks complete before the DIM pointer is cleared by calling synchronize_net() before freeing the DIM context.
How can this vulnerability impact me? :
This vulnerability can cause kernel NULL pointer dereferences leading to kernel crashes or panics. This can result in system instability, denial of service, or unexpected reboots on affected Linux systems using the mlx5e network driver, potentially disrupting network operations and overall system availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the kernel logs for NULL pointer dereference errors related to net_dim(), specifically messages like 'BUG: kernel NULL pointer dereference' and call traces involving net_dim and mlx5_core modules. You can check kernel logs using commands such as 'dmesg | grep net_dim' or 'journalctl -k | grep net_dim' to identify these errors.