CVE-2025-38570

Source
https://cve.org/CVERecord?id=CVE-2025-38570
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38570.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-38570
Downstream
Published
2025-08-19T17:02:50.677Z
Modified
2026-03-13T01:11:17.071895Z
Summary
eth: fbnic: unlink NAPIs from queues on error to open
Details

In the Linux kernel, the following vulnerability has been resolved:

eth: fbnic: unlink NAPIs from queues on error to open

CI hit a UaF in fbnic in the AF_XDP portion of the queues.py test. The UaF is in the _skmarknapiidonce() call in xskbind(), NAPI has been freed. Looks like the device failed to open earlier, and we lack clearing the NAPI pointer from the queue.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38570.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
557d02238e05eb66b9aba9a1f90f3a2131c6c887
Fixed
21d3f8441c7f317b93ba6a8029610c8b7e3773db
Fixed
4b59f9deff3bdb52b223c85048f1d2924803b817
Fixed
4b31bcb025cb497da2b01f87173108ff32d350d2

Affected versions

v6.*
v6.13
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.15
v6.15-rc1
v6.15-rc2
v6.15-rc3
v6.15-rc4
v6.15-rc5
v6.15-rc6
v6.15-rc7
v6.15.1
v6.15.2
v6.15.3
v6.15.4
v6.15.5
v6.15.6
v6.15.7
v6.15.8
v6.15.9
v6.16
v6.16-rc1
v6.16-rc2
v6.16-rc3
v6.16-rc4
v6.16-rc5
v6.16-rc6
v6.16-rc7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38570.json"
vanir_signatures
[
    {
        "signature_version": "v1",
        "target": {
            "file": "drivers/net/ethernet/meta/fbnic/fbnic_netdev.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4b59f9deff3bdb52b223c85048f1d2924803b817",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "69477218224084992048025838937813711733",
                "1923741244928270325552151006268226727",
                "312476414581075673881227946998942562463",
                "171087105200315539882242542364512949062",
                "214569995983850692786001215083423506016",
                "167181400804634184812343642057271093221",
                "231345267480716456596234100943414475453",
                "108577349754651976304389211566212942352"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2025-38570-5d117273",
        "signature_type": "Line"
    },
    {
        "signature_version": "v1",
        "target": {
            "file": "drivers/net/ethernet/meta/fbnic/fbnic_netdev.c",
            "function": "__fbnic_open"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4b59f9deff3bdb52b223c85048f1d2924803b817",
        "deprecated": false,
        "digest": {
            "function_hash": "154577426176180961521342779001893799735",
            "length": 829.0
        },
        "id": "CVE-2025-38570-86206366",
        "signature_type": "Function"
    }
]