CVE-2025-38331
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/07/2025
Last modified:
19/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: ethernet: cortina: Use TOE/TSO on all TCP<br />
<br />
It is desireable to push the hardware accelerator to also<br />
process non-segmented TCP frames: we pass the skb->len<br />
to the "TOE/TSO" offloader and it will handle them.<br />
<br />
Without this quirk the driver becomes unstable and lock<br />
up and and crash.<br />
<br />
I do not know exactly why, but it is probably due to the<br />
TOE (TCP offload engine) feature that is coupled with the<br />
segmentation feature - it is not possible to turn one<br />
part off and not the other, either both TOE and TSO are<br />
active, or neither of them.<br />
<br />
Not having the TOE part active seems detrimental, as if<br />
that hardware feature is not really supposed to be turned<br />
off.<br />
<br />
The datasheet says:<br />
<br />
"Based on packet parsing and TCP connection/NAT table<br />
lookup results, the NetEngine puts the packets<br />
belonging to the same TCP connection to the same queue<br />
for the software to process. The NetEngine puts<br />
incoming packets to the buffer or series of buffers<br />
for a jumbo packet. With this hardware acceleration,<br />
IP/TCP header parsing, checksum validation and<br />
connection lookup are offloaded from the software<br />
processing."<br />
<br />
After numerous tests with the hardware locking up after<br />
something between minutes and hours depending on load<br />
using iperf3 I have concluded this is necessary to stabilize<br />
the hardware.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.16 (including) | 6.1.142 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.95 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.35 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.4 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1b503b790109d19710ec83c589c3ee59e95347ec
- https://git.kernel.org/stable/c/2bd434bb0eeb680c2b3dd6c68ca319b30cb8d47f
- https://git.kernel.org/stable/c/6a07e3af4973402fa199a80036c10060b922c92c
- https://git.kernel.org/stable/c/a37888a435b0737128d2d9c6f67b8d608f83df7a
- https://git.kernel.org/stable/c/ebe12e232f1d58ebb4b53b6d9149962b707bed91
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



