CVE-2025-38417

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/07/2025
Last modified:
19/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ice: fix eswitch code memory leak in reset scenario<br /> <br /> Add simple eswitch mode checker in attaching VF procedure and allocate<br /> required port representor memory structures only in switchdev mode.<br /> The reset flows triggers VF (if present) detach/attach procedure.<br /> It might involve VF port representor(s) re-creation if the device is<br /> configured is switchdev mode (not legacy one).<br /> The memory was blindly allocated in current implementation,<br /> regardless of the mode and not freed if in legacy mode.<br /> <br /> Kmemeleak trace:<br /> unreferenced object (percpu) 0x7e3bce5b888458 (size 40):<br /> comm "bash", pid 1784, jiffies 4295743894<br /> hex dump (first 32 bytes on cpu 45):<br /> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br /> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br /> backtrace (crc 0):<br /> pcpu_alloc_noprof+0x4c4/0x7c0<br /> ice_repr_create+0x66/0x130 [ice]<br /> ice_repr_create_vf+0x22/0x70 [ice]<br /> ice_eswitch_attach_vf+0x1b/0xa0 [ice]<br /> ice_reset_all_vfs+0x1dd/0x2f0 [ice]<br /> ice_pci_err_resume+0x3b/0xb0 [ice]<br /> pci_reset_function+0x8f/0x120<br /> reset_store+0x56/0xa0<br /> kernfs_fop_write_iter+0x120/0x1b0<br /> vfs_write+0x31c/0x430<br /> ksys_write+0x61/0xd0<br /> do_syscall_64+0x5b/0x180<br /> entry_SYSCALL_64_after_hwframe+0x76/0x7e<br /> <br /> Testing hints (ethX is PF netdev):<br /> - create at least one VF<br /> echo 1 &gt; /sys/class/net/ethX/device/sriov_numvfs<br /> - trigger the reset<br /> echo 1 &gt; /sys/class/net/ethX/device/reset

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.12 (including) 6.12.35 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.15.4 (excluding)
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*