In the Linux kernel, the following vulnerability has been resolved:
net: drv: netdevsim: don't napi_complete() from netpoll
netdevsim supports netpoll. Make sure we don't call napicomplete() from it, since it may not be scheduled. Breno reports hitting a warning in napicomplete_done():
WARNING: CPU: 14 PID: 104 at net/core/dev.c:6592 napicompletedone+0x2cc/0x560 _napipoll+0x2d8/0x3a0 handle_softirqs+0x1fe/0x710
This is presumably after netpoll stole the SCHED bit prematurely.
[
{
"id": "CVE-2025-38270-0a0e6602",
"deprecated": false,
"signature_type": "Function",
"target": {
"file": "drivers/net/netdevsim/netdev.c",
"function": "nsim_poll"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6837dd877270c57689bd866de9f3de14172c2439",
"digest": {
"length": 207.0,
"function_hash": "91313916988601487876704008996567280003"
},
"signature_version": "v1"
},
{
"id": "CVE-2025-38270-1e749da9",
"deprecated": false,
"signature_type": "Function",
"target": {
"file": "drivers/net/netdevsim/netdev.c",
"function": "nsim_poll"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1264971017b4d7141352a7fe29021bdfce5d885d",
"digest": {
"length": 207.0,
"function_hash": "91313916988601487876704008996567280003"
},
"signature_version": "v1"
},
{
"id": "CVE-2025-38270-6215d755",
"deprecated": false,
"signature_type": "Line",
"target": {
"file": "drivers/net/netdevsim/netdev.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a8ff2e362d901200a1075c3ca9c56d9c7bbef389",
"digest": {
"line_hashes": [
"118661880643141705307166690565763284854",
"118935584157253255801992547669289612010",
"175960747092026932047486113156741261754",
"67515189520698904048828066957367063427"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2025-38270-f0651bcc",
"deprecated": false,
"signature_type": "Line",
"target": {
"file": "drivers/net/netdevsim/netdev.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6837dd877270c57689bd866de9f3de14172c2439",
"digest": {
"line_hashes": [
"118661880643141705307166690565763284854",
"118935584157253255801992547669289612010",
"175960747092026932047486113156741261754",
"225664407331854916506428304664119313150"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2025-38270-fa099be3",
"deprecated": false,
"signature_type": "Line",
"target": {
"file": "drivers/net/netdevsim/netdev.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1264971017b4d7141352a7fe29021bdfce5d885d",
"digest": {
"line_hashes": [
"118661880643141705307166690565763284854",
"118935584157253255801992547669289612010",
"175960747092026932047486113156741261754",
"225664407331854916506428304664119313150"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2025-38270-fb6e4526",
"deprecated": false,
"signature_type": "Function",
"target": {
"file": "drivers/net/netdevsim/netdev.c",
"function": "nsim_poll"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a8ff2e362d901200a1075c3ca9c56d9c7bbef389",
"digest": {
"length": 207.0,
"function_hash": "91313916988601487876704008996567280003"
},
"signature_version": "v1"
}
]