net: mctp: Don't access ifa_index when missing
Summary
| CVE | CVE-2025-38006 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2025-06-18 10:15:31 UTC |
| Updated | 2026-04-18 09:16:10 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: net: mctp: Don't access ifa_index when missing In mctp_dump_addrinfo, ifa_index can be used to filter interfaces, but only when the struct ifaddrmsg is provided. Otherwise it will be comparing to uninitialised memory - reproducible in the syzkaller case from dhcpd, or busybox "ip addr show". The kernel MCTP implementation has always filtered by ifa_index, so existing userspace programs expecting to dump MCTP addresses must already be passing a valid ifa_index value (either 0 or a real index). BUG: KMSAN: uninit-value in mctp_dump_addrinfo+0x208/0xac0 net/mctp/device.c:128 mctp_dump_addrinfo+0x208/0xac0 net/mctp/device.c:128 rtnl_dump_all+0x3ec/0x5b0 net/core/rtnetlink.c:4380 rtnl_dumpit+0xd5/0x2f0 net/core/rtnetlink.c:6824 netlink_dump+0x97b/0x1690 net/netlink/af_netlink.c:2309 |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Problem Types: CWE-908
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 583be982d93479ea3d85091b0fd0b01201ede87d 8ef7b3f0db69e2f4a80be351f6aee9a4c2332ef9 git | Not specified |
| CNA | Linux | Linux | affected 583be982d93479ea3d85091b0fd0b01201ede87d acab78ae12c7fefb4f3bfe22e00770a5faa42724 git | Not specified |
| CNA | Linux | Linux | affected 583be982d93479ea3d85091b0fd0b01201ede87d d4d1561d17eb72908e4489c0900d96e0484fac20 git | Not specified |
| CNA | Linux | Linux | affected 583be982d93479ea3d85091b0fd0b01201ede87d 24fa213dffa470166ec014f979f36c6ff44afb45 git | Not specified |
| CNA | Linux | Linux | affected 583be982d93479ea3d85091b0fd0b01201ede87d f11cf946c0a92c560a890d68e4775723353599e1 git | Not specified |
| CNA | Linux | Linux | affected 5.15 | Not specified |
| CNA | Linux | Linux | unaffected 5.15 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.203 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.92 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.30 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.14.8 6.14.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.15 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/acab78ae12c7fefb4f3bfe22e00770a5faa42724 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/f11cf946c0a92c560a890d68e4775723353599e1 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/8ef7b3f0db69e2f4a80be351f6aee9a4c2332ef9 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/24fa213dffa470166ec014f979f36c6ff44afb45 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/d4d1561d17eb72908e4489c0900d96e0484fac20 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.