CVE-2025-38417

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38417
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38417.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-38417
Downstream
Related
Published
2025-07-25T14:15:33Z
Modified
2025-07-25T21:00:42Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

ice: fix eswitch code memory leak in reset scenario

Add simple eswitch mode checker in attaching VF procedure and allocate required port representor memory structures only in switchdev mode. The reset flows triggers VF (if present) detach/attach procedure. It might involve VF port representor(s) re-creation if the device is configured is switchdev mode (not legacy one). The memory was blindly allocated in current implementation, regardless of the mode and not freed if in legacy mode.

Kmemeleak trace: unreferenced object (percpu) 0x7e3bce5b888458 (size 40): comm "bash", pid 1784, jiffies 4295743894 hex dump (first 32 bytes on cpu 45): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): pcpuallocnoprof+0x4c4/0x7c0 icereprcreate+0x66/0x130 [ice] icereprcreatevf+0x22/0x70 [ice] iceeswitchattachvf+0x1b/0xa0 [ice] iceresetallvfs+0x1dd/0x2f0 [ice] icepcierrresume+0x3b/0xb0 [ice] pciresetfunction+0x8f/0x120 resetstore+0x56/0xa0 kernfsfopwriteiter+0x120/0x1b0 vfswrite+0x31c/0x430 ksyswrite+0x61/0xd0 dosyscall64+0x5b/0x180 entrySYSCALL64afterhwframe+0x76/0x7e

Testing hints (ethX is PF netdev): - create at least one VF echo 1 > /sys/class/net/ethX/device/sriov_numvfs - trigger the reset echo 1 > /sys/class/net/ethX/device/reset

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.35-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}