CVE-2025-38735

Source
https://cve.org/CVERecord?id=CVE-2025-38735
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38735.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38735
Downstream
Related
Published
2025-09-05T17:20:35.459Z
Modified
2026-03-12T02:16:15.285061Z
Summary
gve: prevent ethtool ops after shutdown
Details

In the Linux kernel, the following vulnerability has been resolved:

gve: prevent ethtool ops after shutdown

A crash can occur if an ethtool operation is invoked after shutdown() is called.

shutdown() is invoked during system shutdown to stop DMA operations without performing expensive deallocations. It is discouraged to unregister the netdev in this path, so the device may still be visible to userspace and kernel helpers.

In gve, shutdown() tears down most internal data structures. If an ethtool operation is dispatched after shutdown(), it will dereference freed or NULL pointers, leading to a kernel panic. While graceful shutdown normally quiesces userspace before invoking the reboot syscall, forced shutdowns (as observed on GCP VMs) can still trigger this path.

Fix by calling netifdevicedetach() in shutdown(). This marks the device as detached so the ethtool ioctl handler will skip dispatching operations to the driver.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38735.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
974365e518617c9ce917f61aacbba07e4bedcca0
Fixed
48a4e89d50e8ea52e800bc7865970b92fcf4647c
Fixed
ba51d73408edf815cbaeab148625576c2dd90192
Fixed
a7efffeecb881b4649fdc30de020ef910f35d646
Fixed
9d8a41e9a4ff83ff666de811e7f012167cdc00e9
Fixed
75a9a46d67f46d608205888f9b34e315c1786345

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38735.json"