CVE-2025-38270

Source
https://cve.org/CVERecord?id=CVE-2025-38270
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38270.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38270
Downstream
Related
Published
2025-07-10T07:41:52.475Z
Modified
2026-03-12T02:15:48.117264Z
Summary
net: drv: netdevsim: don't napi_complete() from netpoll
Details

In the Linux kernel, the following vulnerability has been resolved:

net: drv: netdevsim: don't napi_complete() from netpoll

netdevsim supports netpoll. Make sure we don't call napicomplete() from it, since it may not be scheduled. Breno reports hitting a warning in napicomplete_done():

WARNING: CPU: 14 PID: 104 at net/core/dev.c:6592 napicompletedone+0x2cc/0x560 __napipoll+0x2d8/0x3a0 handlesoftirqs+0x1fe/0x710

This is presumably after netpoll stole the SCHED bit prematurely.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38270.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3762ec05a9fbda16aaaa2568df679ab8ad13f38d
Fixed
a8ff2e362d901200a1075c3ca9c56d9c7bbef389
Fixed
6837dd877270c57689bd866de9f3de14172c2439
Fixed
1264971017b4d7141352a7fe29021bdfce5d885d

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38270.json"