-

CVE-2025-38569

In the Linux kernel, the following vulnerability has been resolved:

benet: fix BUG when creating VFs

benet crashes as soon as SRIOV VFs are created:

 kernel BUG at mm/vmalloc.c:3457!
 Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
 CPU: 4 UID: 0 PID: 7408 Comm: test.sh Kdump: loaded Not tainted 6.16.0+ #1 PREEMPT(voluntary)
 [...]
 RIP: 0010:vunmap+0x5f/0x70
 [...]
 Call Trace:
  <TASK>
  __iommu_dma_free+0xe8/0x1c0
  be_cmd_set_mac_list+0x3fe/0x640 [be2net]
  be_cmd_set_mac+0xaf/0x110 [be2net]
  be_vf_eth_addr_config+0x19f/0x330 [be2net]
  be_vf_setup+0x4f7/0x990 [be2net]
  be_pci_sriov_configure+0x3a1/0x470 [be2net]
  sriov_numvfs_store+0x20b/0x380
  kernfs_fop_write_iter+0x354/0x530
  vfs_write+0x9b9/0xf60
  ksys_write+0xf3/0x1d0
  do_syscall_64+0x8c/0x3d0

be_cmd_set_mac_list() calls dma_free_coherent() under a spin_lock_bh.
Fix it by freeing only after the lock has been released.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 3697e37e012bbd2bb5a5b467689811ba097b2eff
Version 797bb9439c0489bbea4b8808297ec7a569098667
Status affected
Version < 975e73b9102d844a3dc3f091ad631c56145c8b4c
Version 7cfae8627511361f90a1a22dfae556c3fbc5bd8d
Status affected
Version < f80b34ebc579216407b128e9d155bfcae875c30f
Version 671aaa17bd3153e25526934f92307169ce927b5e
Status affected
Version < 46d44a23a3723a89deeb65b13cddb17f8d9f2700
Version 4393452e6c0c027971ec9bcc9557f52e63db3f0a
Status affected
Version < c377ba2be9430d165a98e4b782902ed630bc7546
Version 41d731e7920387ea13e2fb440a1e235686faeeb9
Status affected
Version < 0ddfe8b127ef1149fddccb79db6e6eaba7738e7d
Version fd1ef3b1bdd3fec683ebd19eb3acc6a2cb60b5c6
Status affected
Version < d5dc09ee5d74277bc47193fe28ce8703e229331b
Version 1a82d19ca2d6835904ee71e2d40fd331098f94a0
Status affected
Version < f4e4e0c4bc4d799d6fa39055acdbc3af066cd13e
Version 1a82d19ca2d6835904ee71e2d40fd331098f94a0
Status affected
Version < 5a40f8af2ba1b9bdf46e2db10e8c9710538fbc63
Version 1a82d19ca2d6835904ee71e2d40fd331098f94a0
Status affected
Version 227a829c9067bf03b1967e7e0b1a6777fd57edef
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.14
Status affected
Version < 6.14
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.148
Status unaffected
Version <= 6.6.*
Version 6.6.102
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.05% 0.142
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string