CVE-2025-39768

5.5 MEDIUM

📋 TL;DR

This CVE addresses an error handling flaw in the Linux kernel's mlx5 network driver when rehashing complex rules. If moving rules between matchers fails, improper error flow could cause kernel soft lock-ups or problematic behavior, potentially leading to denial of service. Systems using Mellanox network hardware with affected Linux kernel versions are impacted.

💻 Affected Systems

Products:
  • Linux kernel with mlx5 driver
Versions: Specific affected versions not specified in CVE, but patches available for stable kernel branches
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Mellanox network hardware and mlx5 driver usage. Trigger requires specific network rule rehashing operations.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel soft lock-ups causing system crashes or denial of service, potentially affecting network connectivity and system stability.

🟠

Likely Case

Degraded network performance, broken steering rules, or system instability requiring reboot.

🟢

If Mitigated

Broken steering rules but kernel continues functioning without lock-ups, maintaining basic system operation.

🌐 Internet-Facing: LOW - This is a kernel-level driver issue requiring local access or specific network conditions to trigger.
🏢 Internal Only: MEDIUM - Internal systems using affected network hardware could experience stability issues affecting services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific error conditions during rule rehashing, likely requiring local access or specific network operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel branches (commits 37d54bc28d092bc3b314da45d730f00e9d86ec2a and 4a842b1bf18a32ee0c25dd6dd98728b786a76fe4)

Vendor Advisory: https://git.kernel.org/stable/c/37d54bc28d092bc3b314da45d730f00e9d86ec2a

Restart Required: No

Instructions:

1. Update Linux kernel to version containing the fix. 2. For distributions: Apply kernel security updates from your vendor. 3. Rebuild kernel if compiling from source with the patch applied.

🔧 Temporary Workarounds

Disable mlx5 hardware offloading

Linux

Prevents the vulnerable code path by disabling hardware steering offloading

ethtool -K <interface> hw-tc-offload off

🧯 If You Can't Patch

  • Monitor system logs for kernel soft lock-up messages or network performance degradation
  • Consider replacing or avoiding Mellanox network hardware until patched

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if mlx5 driver is loaded: lsmod | grep mlx5

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits or check with distribution's security advisory

📡 Detection & Monitoring

Log Indicators:

  • Kernel soft lock-up messages in dmesg
  • Network driver error messages related to mlx5 or rule rehashing

Network Indicators:

  • Unexpected network performance degradation on systems with Mellanox hardware

SIEM Query:

source="kernel" AND ("soft lockup" OR "mlx5" OR "rehash")

🔗 References

📤 Share & Export