CVE-2025-38470
BaseFortify
Publication date: 2025-07-28
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's 8021q module involves improper handling of VLAN 0 when the 'rx-vlan-filter' feature is toggled during runtime. Specifically, if the 'rx-vlan-filter' is disabled while the network device is running, the module may fail to remove VLAN 0 when the device is brought down, causing a memory leak. Additionally, toggling the filter can cause a reference count imbalance leading to kernel bugs or crashes due to attempts to delete VLAN 0 that was never properly added. The root cause is that the system does not correctly track whether VLAN 0 was automatically added when the device was brought up, leading to incorrect removal attempts when the device is brought down.
How can this vulnerability impact me? :
This vulnerability can lead to memory leaks in the Linux kernel, which may degrade system performance or stability over time. More critically, it can cause kernel crashes or bugs (such as null pointer dereferences) due to reference count imbalances when VLAN 0 is improperly deleted. These crashes can lead to system instability, potential denial of service, or unexpected behavior in network operations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking if the 'rx-vlan-filter' feature is toggled on a network device and observing if VLAN 0 is improperly added or removed, which may cause memory leaks or kernel bugs. Commands to inspect this include: 'ip link show' to list network devices, 'ethtool -k <device>' to check the status of 'rx-vlan-filter', and monitoring kernel logs for BUG_ON or null pointer dereference errors related to VLAN 0. Example commands: 1) ip link show 2) ethtool -k <device> | grep rx-vlan-filter 3) dmesg | grep vlan or dmesg | grep BUG_ON
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding toggling the 'rx-vlan-filter' feature on network devices while they are running, especially disabling it, as this can cause memory leaks or kernel crashes. If possible, update the Linux kernel to a version where this vulnerability is fixed. Also, carefully manage VLAN 0 configurations and avoid deleting VLAN 0 interfaces manually if the 'rx-vlan-filter' feature state has been changed during runtime.