We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38441

netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto()



Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() syzbot found a potential access to uninit-value in nf_flow_pppoe_proto() Blamed commit forgot the Ethernet header. BUG: KMSAN: uninit-value in nf_flow_offload_inet_hook+0x7e4/0x940 net/netfilter/nf_flow_table_inet.c:27 nf_flow_offload_inet_hook+0x7e4/0x940 net/netfilter/nf_flow_table_inet.c:27 nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline] nf_hook_slow+0xe1/0x3d0 net/netfilter/core.c:623 nf_hook_ingress include/linux/netfilter_netdev.h:34 [inline] nf_ingress net/core/dev.c:5742 [inline] __netif_receive_skb_core+0x4aff/0x70c0 net/core/dev.c:5837 __netif_receive_skb_one_core net/core/dev.c:5975 [inline] __netif_receive_skb+0xcc/0xac0 net/core/dev.c:6090 netif_receive_skb_internal net/core/dev.c:6176 [inline] netif_receive_skb+0x57/0x630 net/core/dev.c:6235 tun_rx_batched+0x1df/0x980 drivers/net/tun.c:1485 tun_get_user+0x4ee0/0x6b40 drivers/net/tun.c:1938 tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1984 new_sync_write fs/read_write.c:593 [inline] vfs_write+0xb4b/0x1580 fs/read_write.c:686 ksys_write fs/read_write.c:738 [inline] __do_sys_write fs/read_write.c:749 [inline]

Reserved 2025-04-16 | Published 2025-07-25 | Updated 2025-07-25 | Assigner Linux

Product status

Default status
unaffected

d06977b9a4109f8738bb276125eb6a0b772bc433 before a3aea97d55964e70a1e6426aa4cafdc036e8a2dd
affected

8bf7c76a2a207ca2b4cfda0a279192adf27678d7 before eed8960b289327235185b7c32649c3470a3e969b
affected

a2471d271042ea18e8a6babc132a8716bb2f08b9 before 9fbc49429a23b02595ba82536c5ea425fdabb221
affected

87b3593bed1868b2d9fe096c01bcdf0ea86cbebf before e0dd2e9729660f3f4fcb16e0aef87342911528ef
affected

87b3593bed1868b2d9fe096c01bcdf0ea86cbebf before cfbf0665969af2c69d10c377d4c3d306e717efb4
affected

87b3593bed1868b2d9fe096c01bcdf0ea86cbebf before 18cdb3d982da8976b28d57691eb256ec5688fad2
affected

cf366ee3bc1b7d1c76a882640ba3b3f8f1039163
affected

Default status
affected

6.9
affected

Any version before 6.9
unaffected

5.15.189
unaffected

6.1.146
unaffected

6.6.99
unaffected

6.12.39
unaffected

6.15.7
unaffected

6.16-rc6
unaffected

References

git.kernel.org/...c/a3aea97d55964e70a1e6426aa4cafdc036e8a2dd

git.kernel.org/...c/eed8960b289327235185b7c32649c3470a3e969b

git.kernel.org/...c/9fbc49429a23b02595ba82536c5ea425fdabb221

git.kernel.org/...c/e0dd2e9729660f3f4fcb16e0aef87342911528ef

git.kernel.org/...c/cfbf0665969af2c69d10c377d4c3d306e717efb4

git.kernel.org/...c/18cdb3d982da8976b28d57691eb256ec5688fad2

cve.org (CVE-2025-38441)

nvd.nist.gov (CVE-2025-38441)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38441

Support options

Helpdesk Chat, Email, Knowledgebase