CVE-2025-38417
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/07/2025
Last modified:
19/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ice: fix eswitch code memory leak in reset scenario<br />
<br />
Add simple eswitch mode checker in attaching VF procedure and allocate<br />
required port representor memory structures only in switchdev mode.<br />
The reset flows triggers VF (if present) detach/attach procedure.<br />
It might involve VF port representor(s) re-creation if the device is<br />
configured is switchdev mode (not legacy one).<br />
The memory was blindly allocated in current implementation,<br />
regardless of the mode and not freed if in legacy mode.<br />
<br />
Kmemeleak trace:<br />
unreferenced object (percpu) 0x7e3bce5b888458 (size 40):<br />
comm "bash", pid 1784, jiffies 4295743894<br />
hex dump (first 32 bytes on cpu 45):<br />
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br />
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br />
backtrace (crc 0):<br />
pcpu_alloc_noprof+0x4c4/0x7c0<br />
ice_repr_create+0x66/0x130 [ice]<br />
ice_repr_create_vf+0x22/0x70 [ice]<br />
ice_eswitch_attach_vf+0x1b/0xa0 [ice]<br />
ice_reset_all_vfs+0x1dd/0x2f0 [ice]<br />
ice_pci_err_resume+0x3b/0xb0 [ice]<br />
pci_reset_function+0x8f/0x120<br />
reset_store+0x56/0xa0<br />
kernfs_fop_write_iter+0x120/0x1b0<br />
vfs_write+0x31c/0x430<br />
ksys_write+0x61/0xd0<br />
do_syscall_64+0x5b/0x180<br />
entry_SYSCALL_64_after_hwframe+0x76/0x7e<br />
<br />
Testing hints (ethX is PF netdev):<br />
- create at least one VF<br />
echo 1 > /sys/class/net/ethX/device/sriov_numvfs<br />
- trigger the reset<br />
echo 1 > /sys/class/net/ethX/device/reset
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.35 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



