CVE-2025-38148
📋 TL;DR
A memory leak vulnerability exists in the Linux kernel's MSCC PHY driver when using one-step timestamping. This causes kernel memory exhaustion over time, potentially leading to system instability or denial of service. Systems using affected Linux kernel versions with MSCC PHY hardware and one-step timestamping enabled are vulnerable.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Sustained exploitation could exhaust kernel memory, causing system crashes, denial of service, or kernel panic requiring reboot.
Likely Case
Gradual memory consumption leading to system performance degradation and eventual instability over time.
If Mitigated
Minimal impact if one-step timestamping is disabled or systems are patched.
🎯 Exploit Status
Exploitation requires local access or ability to trigger one-step timestamping operations. Memory leak is gradual, not immediate.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patched in stable kernel versions via provided git commits
Vendor Advisory: https://git.kernel.org/stable/c/0b40aeaf83ca04d4c9801e235b7533400c8b5f17
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.
🔧 Temporary Workarounds
Disable one-step timestamping
linuxDisable one-step timestamping feature on MSCC PHY hardware
echo 0 > /sys/class/net/[interface]/phy/one_step_timestamping
🧯 If You Can't Patch
- Disable one-step timestamping on all MSCC PHY interfaces
- Monitor kernel memory usage and restart systems showing memory exhaustion
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if MSCC PHY hardware with one-step timestamping is in use
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes one of the patch commits: 0b40aeaf83ca, 24b24295464f, 66abe2201752, 846992645b25, or cdbabd316c5a
📡 Detection & Monitoring
Log Indicators:
- Kernel OOM (Out of Memory) messages
- System instability logs
- High kernel memory usage
Network Indicators:
- None specific - this is a local memory management issue
SIEM Query:
Search for kernel panic logs or memory exhaustion alerts on systems with MSCC PHY hardware
🔗 References
- https://git.kernel.org/stable/c/0b40aeaf83ca04d4c9801e235b7533400c8b5f17
- https://git.kernel.org/stable/c/24b24295464f25fb771d36ed558c7cd942119361
- https://git.kernel.org/stable/c/66abe22017522dd56b820e41ca3a5b131a637001
- https://git.kernel.org/stable/c/846992645b25ec4253167e3f931e4597eb84af56
- https://git.kernel.org/stable/c/cdbabd316c5a4a9b0fda6aafe491e2db17fbb95d
- https://git.kernel.org/stable/c/db2a12ddd3a31f668137ff6a4befc1343c79cbc4
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html