{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-38271","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:23.998Z","datePublished":"2025-07-10T07:41:53.126Z","dateUpdated":"2026-05-11T21:24:38.767Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:24:38.767Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: prevent a NULL deref in rtnl_create_link()\n\nAt the time rtnl_create_link() is running, dev->netdev_ops is NULL,\nwe must not use netdev_lock_ops() or risk a NULL deref if\nCONFIG_NET_SHAPER is defined.\n\nUse netif_set_group() instead of dev_set_group().\n\n RIP: 0010:netdev_need_ops_lock include/net/netdev_lock.h:33 [inline]\n RIP: 0010:netdev_lock_ops include/net/netdev_lock.h:41 [inline]\n RIP: 0010:dev_set_group+0xc0/0x230 net/core/dev_api.c:82\nCall Trace:\n <TASK>\n  rtnl_create_link+0x748/0xd10 net/core/rtnetlink.c:3674\n  rtnl_newlink_create+0x25c/0xb00 net/core/rtnetlink.c:3813\n  __rtnl_newlink net/core/rtnetlink.c:3940 [inline]\n  rtnl_newlink+0x16d6/0x1c70 net/core/rtnetlink.c:4055\n  rtnetlink_rcv_msg+0x7cf/0xb70 net/core/rtnetlink.c:6944\n  netlink_rcv_skb+0x208/0x470 net/netlink/af_netlink.c:2534\n  netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]\n  netlink_unicast+0x75b/0x8d0 net/netlink/af_netlink.c:1339\n  netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1883\n  sock_sendmsg_nosec net/socket.c:712 [inline]"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/core/rtnetlink.c"],"versions":[{"version":"7e4d784f5810bba76c4593791028e13cce4af547","lessThan":"8a29ae8428a5c26f0b4471c2057d9e9415c53109","status":"affected","versionType":"git"},{"version":"7e4d784f5810bba76c4593791028e13cce4af547","lessThan":"feafc73f3e6ae73371777a037d41d2e31c929636","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/core/rtnetlink.c"],"versions":[{"version":"6.15","status":"affected"},{"version":"0","lessThan":"6.15","status":"unaffected","versionType":"semver"},{"version":"6.15.3","lessThanOrEqual":"6.15.*","status":"unaffected","versionType":"semver"},{"version":"6.16","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.15","versionEndExcluding":"6.15.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.15","versionEndExcluding":"6.16"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/8a29ae8428a5c26f0b4471c2057d9e9415c53109"},{"url":"https://git.kernel.org/stable/c/feafc73f3e6ae73371777a037d41d2e31c929636"}],"title":"net: prevent a NULL deref in rtnl_create_link()","x_generator":{"engine":"bippy-1.2.0"}}}}