CVE-2025-38441
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/07/2025
Last modified:
22/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto()<br />
<br />
syzbot found a potential access to uninit-value in nf_flow_pppoe_proto()<br />
<br />
Blamed commit forgot the Ethernet header.<br />
<br />
BUG: KMSAN: uninit-value in nf_flow_offload_inet_hook+0x7e4/0x940 net/netfilter/nf_flow_table_inet.c:27<br />
nf_flow_offload_inet_hook+0x7e4/0x940 net/netfilter/nf_flow_table_inet.c:27<br />
nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline]<br />
nf_hook_slow+0xe1/0x3d0 net/netfilter/core.c:623<br />
nf_hook_ingress include/linux/netfilter_netdev.h:34 [inline]<br />
nf_ingress net/core/dev.c:5742 [inline]<br />
__netif_receive_skb_core+0x4aff/0x70c0 net/core/dev.c:5837<br />
__netif_receive_skb_one_core net/core/dev.c:5975 [inline]<br />
__netif_receive_skb+0xcc/0xac0 net/core/dev.c:6090<br />
netif_receive_skb_internal net/core/dev.c:6176 [inline]<br />
netif_receive_skb+0x57/0x630 net/core/dev.c:6235<br />
tun_rx_batched+0x1df/0x980 drivers/net/tun.c:1485<br />
tun_get_user+0x4ee0/0x6b40 drivers/net/tun.c:1938<br />
tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1984<br />
new_sync_write fs/read_write.c:593 [inline]<br />
vfs_write+0xb4b/0x1580 fs/read_write.c:686<br />
ksys_write fs/read_write.c:738 [inline]<br />
__do_sys_write fs/read_write.c:749 [inline]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.157 (including) | 5.15.189 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.88 (including) | 6.1.146 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.29 (including) | 6.6.99 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8.8 (including) | 6.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9.1 (including) | 6.12.39 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/18cdb3d982da8976b28d57691eb256ec5688fad2
- https://git.kernel.org/stable/c/9fbc49429a23b02595ba82536c5ea425fdabb221
- https://git.kernel.org/stable/c/a3aea97d55964e70a1e6426aa4cafdc036e8a2dd
- https://git.kernel.org/stable/c/cfbf0665969af2c69d10c377d4c3d306e717efb4
- https://git.kernel.org/stable/c/e0dd2e9729660f3f4fcb16e0aef87342911528ef
- https://git.kernel.org/stable/c/eed8960b289327235185b7c32649c3470a3e969b
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



