{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-38569","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:24.025Z","datePublished":"2025-08-19T17:02:49.987Z","dateUpdated":"2026-05-11T21:30:37.876Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:30:37.876Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nbenet: fix BUG when creating VFs\n\nbenet crashes as soon as SRIOV VFs are created:\n\n kernel BUG at mm/vmalloc.c:3457!\n Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI\n CPU: 4 UID: 0 PID: 7408 Comm: test.sh Kdump: loaded Not tainted 6.16.0+ #1 PREEMPT(voluntary)\n [...]\n RIP: 0010:vunmap+0x5f/0x70\n [...]\n Call Trace:\n  <TASK>\n  __iommu_dma_free+0xe8/0x1c0\n  be_cmd_set_mac_list+0x3fe/0x640 [be2net]\n  be_cmd_set_mac+0xaf/0x110 [be2net]\n  be_vf_eth_addr_config+0x19f/0x330 [be2net]\n  be_vf_setup+0x4f7/0x990 [be2net]\n  be_pci_sriov_configure+0x3a1/0x470 [be2net]\n  sriov_numvfs_store+0x20b/0x380\n  kernfs_fop_write_iter+0x354/0x530\n  vfs_write+0x9b9/0xf60\n  ksys_write+0xf3/0x1d0\n  do_syscall_64+0x8c/0x3d0\n\nbe_cmd_set_mac_list() calls dma_free_coherent() under a spin_lock_bh.\nFix it by freeing only after the lock has been released."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/emulex/benet/be_cmds.c"],"versions":[{"version":"797bb9439c0489bbea4b8808297ec7a569098667","lessThan":"3697e37e012bbd2bb5a5b467689811ba097b2eff","status":"affected","versionType":"git"},{"version":"7cfae8627511361f90a1a22dfae556c3fbc5bd8d","lessThan":"975e73b9102d844a3dc3f091ad631c56145c8b4c","status":"affected","versionType":"git"},{"version":"671aaa17bd3153e25526934f92307169ce927b5e","lessThan":"f80b34ebc579216407b128e9d155bfcae875c30f","status":"affected","versionType":"git"},{"version":"4393452e6c0c027971ec9bcc9557f52e63db3f0a","lessThan":"46d44a23a3723a89deeb65b13cddb17f8d9f2700","status":"affected","versionType":"git"},{"version":"41d731e7920387ea13e2fb440a1e235686faeeb9","lessThan":"c377ba2be9430d165a98e4b782902ed630bc7546","status":"affected","versionType":"git"},{"version":"fd1ef3b1bdd3fec683ebd19eb3acc6a2cb60b5c6","lessThan":"0ddfe8b127ef1149fddccb79db6e6eaba7738e7d","status":"affected","versionType":"git"},{"version":"1a82d19ca2d6835904ee71e2d40fd331098f94a0","lessThan":"d5dc09ee5d74277bc47193fe28ce8703e229331b","status":"affected","versionType":"git"},{"version":"1a82d19ca2d6835904ee71e2d40fd331098f94a0","lessThan":"f4e4e0c4bc4d799d6fa39055acdbc3af066cd13e","status":"affected","versionType":"git"},{"version":"1a82d19ca2d6835904ee71e2d40fd331098f94a0","lessThan":"5a40f8af2ba1b9bdf46e2db10e8c9710538fbc63","status":"affected","versionType":"git"},{"version":"227a829c9067bf03b1967e7e0b1a6777fd57edef","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/emulex/benet/be_cmds.c"],"versions":[{"version":"6.14","status":"affected"},{"version":"0","lessThan":"6.14","status":"unaffected","versionType":"semver"},{"version":"5.4.297","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.241","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.190","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.148","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.102","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.42","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.15.10","lessThanOrEqual":"6.15.*","status":"unaffected","versionType":"semver"},{"version":"6.16.1","lessThanOrEqual":"6.16.*","status":"unaffected","versionType":"semver"},{"version":"6.17","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.291","versionEndExcluding":"5.4.297"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.235","versionEndExcluding":"5.10.241"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.179","versionEndExcluding":"5.15.190"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.131","versionEndExcluding":"6.1.148"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.83","versionEndExcluding":"6.6.102"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12.19","versionEndExcluding":"6.12.42"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.14","versionEndExcluding":"6.15.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.14","versionEndExcluding":"6.16.1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.14","versionEndExcluding":"6.17"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13.7"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/3697e37e012bbd2bb5a5b467689811ba097b2eff"},{"url":"https://git.kernel.org/stable/c/975e73b9102d844a3dc3f091ad631c56145c8b4c"},{"url":"https://git.kernel.org/stable/c/f80b34ebc579216407b128e9d155bfcae875c30f"},{"url":"https://git.kernel.org/stable/c/46d44a23a3723a89deeb65b13cddb17f8d9f2700"},{"url":"https://git.kernel.org/stable/c/c377ba2be9430d165a98e4b782902ed630bc7546"},{"url":"https://git.kernel.org/stable/c/0ddfe8b127ef1149fddccb79db6e6eaba7738e7d"},{"url":"https://git.kernel.org/stable/c/d5dc09ee5d74277bc47193fe28ce8703e229331b"},{"url":"https://git.kernel.org/stable/c/f4e4e0c4bc4d799d6fa39055acdbc3af066cd13e"},{"url":"https://git.kernel.org/stable/c/5a40f8af2ba1b9bdf46e2db10e8c9710538fbc63"}],"title":"benet: fix BUG when creating VFs","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T17:39:57.223Z"}}]}}