-

CVE-2025-38569

In the Linux kernel, the following vulnerability has been resolved:

benet: fix BUG when creating VFs

benet crashes as soon as SRIOV VFs are created:

 kernel BUG at mm/vmalloc.c:3457!
 Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
 CPU: 4 UID: 0 PID: 7408 Comm: test.sh Kdump: loaded Not tainted 6.16.0+ #1 PREEMPT(voluntary)
 [...]
 RIP: 0010:vunmap+0x5f/0x70
 [...]
 Call Trace:
  <TASK>
  __iommu_dma_free+0xe8/0x1c0
  be_cmd_set_mac_list+0x3fe/0x640 [be2net]
  be_cmd_set_mac+0xaf/0x110 [be2net]
  be_vf_eth_addr_config+0x19f/0x330 [be2net]
  be_vf_setup+0x4f7/0x990 [be2net]
  be_pci_sriov_configure+0x3a1/0x470 [be2net]
  sriov_numvfs_store+0x20b/0x380
  kernfs_fop_write_iter+0x354/0x530
  vfs_write+0x9b9/0xf60
  ksys_write+0xf3/0x1d0
  do_syscall_64+0x8c/0x3d0

be_cmd_set_mac_list() calls dma_free_coherent() under a spin_lock_bh.
Fix it by freeing only after the lock has been released.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 3697e37e012bbd2bb5a5b467689811ba097b2eff
Version 797bb9439c0489bbea4b8808297ec7a569098667
Status affected
Version < 975e73b9102d844a3dc3f091ad631c56145c8b4c
Version 7cfae8627511361f90a1a22dfae556c3fbc5bd8d
Status affected
Version < f80b34ebc579216407b128e9d155bfcae875c30f
Version 671aaa17bd3153e25526934f92307169ce927b5e
Status affected
Version < 46d44a23a3723a89deeb65b13cddb17f8d9f2700
Version 4393452e6c0c027971ec9bcc9557f52e63db3f0a
Status affected
Version < c377ba2be9430d165a98e4b782902ed630bc7546
Version 41d731e7920387ea13e2fb440a1e235686faeeb9
Status affected
Version < 0ddfe8b127ef1149fddccb79db6e6eaba7738e7d
Version fd1ef3b1bdd3fec683ebd19eb3acc6a2cb60b5c6
Status affected
Version < d5dc09ee5d74277bc47193fe28ce8703e229331b
Version 1a82d19ca2d6835904ee71e2d40fd331098f94a0
Status affected
Version < f4e4e0c4bc4d799d6fa39055acdbc3af066cd13e
Version 1a82d19ca2d6835904ee71e2d40fd331098f94a0
Status affected
Version < 5a40f8af2ba1b9bdf46e2db10e8c9710538fbc63
Version 1a82d19ca2d6835904ee71e2d40fd331098f94a0
Status affected
Version 227a829c9067bf03b1967e7e0b1a6777fd57edef
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 6.14
Status affected
Version < 6.14
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.148
Status unaffected
Version <= 6.6.*
Version 6.6.102
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.142
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String