CVE-2025-39768
BaseFortify
Publication date: 2025-09-11
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-617 | The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's handling of complex rules in the mlx5 network driver. When moving rules from one matcher to another, if an error occurs, the kernel's error handling flow was flawed. Instead of allowing the kernel to continue functioning despite broken steering rules, it could lead to soft lock-ups or other problematic behavior. The patch fixes this by improving error handling during the rehashing of complex rules, ensuring that failures do not cause the kernel to hang and that errors are properly reported and handled to minimize damage.
How can this vulnerability impact me? :
If this vulnerability is triggered, it can cause the Linux kernel to enter a series of soft lock-ups or other problematic behaviors, potentially leading to system instability or degraded network functionality. This could disrupt normal operations, especially in environments relying on the mlx5 network driver for steering rules, resulting in broken steering rules and impaired network traffic management.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to the version that includes the patch fixing the complex rules rehash error flow in the net/mlx5 driver. This patch ensures proper error handling and prevents kernel soft lock-ups related to moving steering rules. No other specific mitigation steps are provided.