CVE-2025-38440

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38440
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38440.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38440
Downstream
Published
2025-07-25T16:15:29Z
Modified
2025-08-13T12:49:54.187845Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix race between DIM disable and net_dim()

There's a race between disabling DIM and NAPI callbacks using the dim pointer on the RQ or SQ.

If NAPI checks the DIM state bit and sees it still set, it assumes rq->dim or sq->dim is valid. But if DIM gets disabled right after that check, the pointer might already be set to NULL, leading to a NULL pointer dereference in net_dim().

Fix this by calling synchronize_net() before freeing the DIM context. This ensures all in-progress NAPI callbacks are finished before the pointer is cleared.

Kernel log:

BUG: kernel NULL pointer dereference, address: 0000000000000000 ... RIP: 0010:netdim+0x23/0x190 ... Call Trace: <TASK> ? _die+0x20/0x60 ? pagefaultoops+0x150/0x3e0 ? commoninterrupt+0xf/0xa0 ? sysveccallfunctionsingle+0xb/0x90 ? excpagefault+0x74/0x130 ? asmexcpagefault+0x22/0x30 ? netdim+0x23/0x190 ? mlx5epollicocq+0x41/0x6f0 [mlx5core] ? sysvecapictimerinterrupt+0xb/0x90 mlx5ehandlerxdim+0x92/0xd0 [mlx5core] mlx5enapipoll+0x2cd/0xac0 [mlx5core] ? mlx5epollicocq+0xe5/0x6f0 [mlx5core] busypollstop+0xa2/0x200 ? mlx5enapipoll+0x1d9/0xac0 [mlx5core] ? mlx5etriggerirq+0x130/0x130 [mlx5core] _napibusyloop+0x345/0x3b0 ? sysveccallfunctionsingle+0xb/0x90 ? asmsysveccallfunctionsingle+0x16/0x20 ? sysvecapictimerinterrupt+0xb/0x90 ? pcpufreearea+0x1e4/0x2e0 napibusyloop+0x11/0x20 xskrecvmsg+0x10c/0x130 sockrecvmsg+0x44/0x70 _sysrecvfrom+0xbc/0x130 ? _schedule+0x398/0x890 _x64sysrecvfrom+0x20/0x30 dosyscall64+0x4c/0x100 entrySYSCALL64after_hwframe+0x4b/0x53 ... ---[ end trace 0000000000000000 ]--- ... ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.41-1

Affected versions

6.*

6.12.38-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.12.38-1
6.13~rc6-1~exp1
6.13~rc7-1~exp1
6.13.2-1~exp1
6.13.3-1~exp1
6.13.4-1~exp1
6.13.5-1~exp1
6.13.6-1~exp1
6.13.7-1~exp1
6.13.8-1~exp1
6.13.9-1~exp1
6.13.10-1~exp1
6.13.11-1~exp1
6.14.3-1~exp1
6.14.5-1~exp1
6.14.6-1~exp1
6.15~rc7-1~exp1
6.15-1~exp1
6.15.1-1~exp1
6.15.2-1~exp1
6.15.3-1~exp1
6.15.4-1~exp1
6.15.5-1~exp1
6.15.6-1~exp1
6.16~rc7-1~exp1
6.16-1~exp1

Ecosystem specific

{
    "urgency": "not yet assigned"
}