CVE-2025-38735
Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-476
Desreferencia a puntero nulo (NULL)
Fecha de publicación:
05/09/2025
Última modificación:
08/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
gve: prevent ethtool ops after shutdown<br />
<br />
A crash can occur if an ethtool operation is invoked<br />
after shutdown() is called.<br />
<br />
shutdown() is invoked during system shutdown to stop DMA operations<br />
without performing expensive deallocations. It is discouraged to<br />
unregister the netdev in this path, so the device may still be visible<br />
to userspace and kernel helpers.<br />
<br />
In gve, shutdown() tears down most internal data structures. If an<br />
ethtool operation is dispatched after shutdown(), it will dereference<br />
freed or NULL pointers, leading to a kernel panic. While graceful<br />
shutdown normally quiesces userspace before invoking the reboot<br />
syscall, forced shutdowns (as observed on GCP VMs) can still trigger<br />
this path.<br />
<br />
Fix by calling netif_device_detach() in shutdown().<br />
This marks the device as detached so the ethtool ioctl handler<br />
will skip dispatching operations to the driver.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (incluyendo) | 6.1.149 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.6.103 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.44 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.16.4 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/48a4e89d50e8ea52e800bc7865970b92fcf4647c
- https://git.kernel.org/stable/c/75a9a46d67f46d608205888f9b34e315c1786345
- https://git.kernel.org/stable/c/9d8a41e9a4ff83ff666de811e7f012167cdc00e9
- https://git.kernel.org/stable/c/a7efffeecb881b4649fdc30de020ef910f35d646
- https://git.kernel.org/stable/c/ba51d73408edf815cbaeab148625576c2dd90192
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



