Null Pointer Dereference in Linux Kernel Affects Adapter Functionality
CVE-2025-38053
What is CVE-2025-38053?
A vulnerability in the Linux kernel's idpf module has been identified that can lead to a null pointer dereference during packet transmission validation. Specifically, the idpf_features_check function is designed to compare the skb header length with a hardware-supported value. However, if the vport pointer, which refers to the adapter structure, is null (as it can be during a reset), this leads to a kernel NULL pointer dereference. This issue can cause kernel crashes and disrupt network adapter functionality. The recommended fix stores the maximum header length in the netdev private structure, providing both a caching mechanism and safeguarding against potential null pointer access.
Affected Version(s)
Linux a251eee62133774cf35ff829041377e721ef9c8c
Linux a251eee62133774cf35ff829041377e721ef9c8c
Linux a251eee62133774cf35ff829041377e721ef9c8c < 2dabe349f7882ff1407a784d54d8541909329088