CVE-2025-38569
benet: fix BUG when creating VFs
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: benet: fix BUG when creating VFs benet crashes as soon as SRIOV VFs are created: kernel BUG at mm/vmalloc.c:3457! Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI CPU: 4 UID: 0 PID: 7408 Comm: test.sh Kdump: loaded Not tainted 6.16.0+ #1 PREEMPT(voluntary) [...] RIP: 0010:vunmap+0x5f/0x70 [...] Call Trace: <TASK> __iommu_dma_free+0xe8/0x1c0 be_cmd_set_mac_list+0x3fe/0x640 [be2net] be_cmd_set_mac+0xaf/0x110 [be2net] be_vf_eth_addr_config+0x19f/0x330 [be2net] be_vf_setup+0x4f7/0x990 [be2net] be_pci_sriov_configure+0x3a1/0x470 [be2net] sriov_numvfs_store+0x20b/0x380 kernfs_fop_write_iter+0x354/0x530 vfs_write+0x9b9/0xf60 ksys_write+0xf3/0x1d0 do_syscall_64+0x8c/0x3d0 be_cmd_set_mac_list() calls dma_free_coherent() under a spin_lock_bh.
Fix it by freeing only after the lock has been released.
In the Linux kernel, the following vulnerability has been resolved: benet: fix BUG when creating VFs benet crashes as soon as SRIOV VFs are created: kernel BUG at mm/vmalloc.c:3457! Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI CPU: 4 UID: 0 PID: 7408 Comm: test.sh Kdump: loaded Not tainted 6.16.0+ #1 PREEMPT(voluntary) [...] RIP: 0010:vunmap+0x5f/0x70 [...] Call Trace: <TASK> __iommu_dma_free+0xe8/0x1c0 be_cmd_set_mac_list+0x3fe/0x640 [be2net] be_cmd_set_mac+0xaf/0x110 [be2net] be_vf_eth_addr_config+0x19f/0x330 [be2net] be_vf_setup+0x4f7/0x990 [be2net] be_pci_sriov_configure+0x3a1/0x470 [be2net] sriov_numvfs_store+0x20b/0x380 kernfs_fop_write_iter+0x354/0x530 vfs_write+0x9b9/0xf60 ksys_write+0xf3/0x1d0 do_syscall_64+0x8c/0x3d0 be_cmd_set_mac_list() calls dma_free_coherent() under a spin_lock_bh. Fix it by freeing only after the lock has been released.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2025-04-16 CVE Reserved
- 2025-08-19 CVE Published
- 2025-08-19 CVE Updated
- 2025-08-25 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
https://git.kernel.org/stable/c/4393452e6c0c027971ec9bcc9557f52e63db3f0a | Vuln. Introduced | |
https://git.kernel.org/stable/c/41d731e7920387ea13e2fb440a1e235686faeeb9 | Vuln. Introduced | |
https://git.kernel.org/stable/c/fd1ef3b1bdd3fec683ebd19eb3acc6a2cb60b5c6 | Vuln. Introduced | |
https://git.kernel.org/stable/c/1a82d19ca2d6835904ee71e2d40fd331098f94a0 | Vuln. Introduced | |
https://git.kernel.org/stable/c/797bb9439c0489bbea4b8808297ec7a569098667 | Vuln. Introduced | |
https://git.kernel.org/stable/c/7cfae8627511361f90a1a22dfae556c3fbc5bd8d | Vuln. Introduced | |
https://git.kernel.org/stable/c/671aaa17bd3153e25526934f92307169ce927b5e | Vuln. Introduced | |
https://git.kernel.org/stable/c/227a829c9067bf03b1967e7e0b1a6777fd57edef | Vuln. Introduced |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.1.131 < 6.1.148 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.1.131 < 6.1.148" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.6.83 < 6.6.102 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.6.83 < 6.6.102" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.12.19 < 6.12.42 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.12.19 < 6.12.42" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.14 < 6.15.10 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.14 < 6.15.10" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.14 < 6.16.1 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.14 < 6.16.1" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.14 < 6.17-rc1 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.14 < 6.17-rc1" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 5.4.291 Search vendor "Linux" for product "Linux Kernel" and version "5.4.291" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 5.10.235 Search vendor "Linux" for product "Linux Kernel" and version "5.10.235" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 5.15.179 Search vendor "Linux" for product "Linux Kernel" and version "5.15.179" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 6.13.7 Search vendor "Linux" for product "Linux Kernel" and version "6.13.7" | en |
Affected
|