CVE-2025-38146

7.8 HIGH

📋 TL;DR

A vulnerability in the Linux kernel's Open vSwitch module allows specially crafted MPLS packets to cause a dead loop during parsing, leading to CPU soft lockups and denial of service. This affects systems running Linux kernels with Open vSwitch enabled, particularly network virtualization environments and cloud infrastructure. Attackers can exploit this to disrupt network functionality and cause system instability.

💻 Affected Systems

Products:
  • Linux kernel with Open vSwitch module
Versions: Linux kernel versions up to and including 5.15.0-121-generic (specific affected versions may vary by distribution)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when Open vSwitch module is loaded and processing MPLS packets. Many systems may not have Open vSwitch enabled by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability due to CPU soft lockup, causing network disruption and potential cascading failures in virtualized environments.

🟠

Likely Case

Denial of service affecting network connectivity and performance in systems processing MPLS traffic through Open vSwitch.

🟢

If Mitigated

Minimal impact if Open vSwitch is not used or MPLS traffic is filtered at network boundaries.

🌐 Internet-Facing: MEDIUM - Requires MPLS packets to reach vulnerable systems, but many internet-facing systems may not process MPLS traffic.
🏢 Internal Only: HIGH - Internal network segments often use MPLS for virtualization and SDN, making internal systems more vulnerable.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Requires sending specially crafted MPLS packets to vulnerable systems.

Exploitation requires network access to send MPLS packets to systems with Open vSwitch enabled. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in kernel commits referenced in CVE (e.g., 0bdc924bfb319fb10d1113cbf091fc26fb7b1f99)

Vendor Advisory: https://git.kernel.org/stable/c/0bdc924bfb319fb10d1113cbf091fc26fb7b1f99

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify Open vSwitch module loads correctly after reboot.

🔧 Temporary Workarounds

Disable Open vSwitch module

linux

Unload Open vSwitch kernel module if not required

sudo rmmod openvswitch

Block MPLS traffic at network boundary

linux

Filter MPLS packets using firewall rules

sudo iptables -A INPUT -p mpls -j DROP
sudo iptables -A FORWARD -p mpls -j DROP

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems using Open vSwitch
  • Deploy network monitoring to detect and alert on MPLS traffic anomalies

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if Open vSwitch module is loaded: uname -r && lsmod | grep openvswitch

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is newer than vulnerable versions and test with MPLS traffic

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • Soft lockup CPU stall warnings
  • Open vSwitch error logs

Network Indicators:

  • Unusual MPLS packet patterns
  • Network connectivity loss to Open vSwitch systems

SIEM Query:

source="kernel" AND ("soft lockup" OR "CPU stuck" OR "array-index-out-of-bounds")

🔗 References

📤 Share & Export