CVE-2025-38120

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_set_pipapo_avx2: fix initial map fill If the first field doesn't cover the entire start map, then we must zero out the remainder, else we leak those bits into the next match round map. The early fix was incomplete and did only fix up the generic C implementation. A followup patch adds a test case to nft_concat_range.sh.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

17 Dec 2025, 18:49

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/251496ce1728c9fd47bd2b20a7b21b20b9a020ca - () https://git.kernel.org/stable/c/251496ce1728c9fd47bd2b20a7b21b20b9a020ca - Patch
References () https://git.kernel.org/stable/c/39bab2d3517b5b50c609b4f8c66129bf619fffa0 - () https://git.kernel.org/stable/c/39bab2d3517b5b50c609b4f8c66129bf619fffa0 - Patch
References () https://git.kernel.org/stable/c/8068e1e42b46518ce680dc6470bcd710efc3fa0a - () https://git.kernel.org/stable/c/8068e1e42b46518ce680dc6470bcd710efc3fa0a - Patch
References () https://git.kernel.org/stable/c/8164d0efaf370c425dc69a1e8216940d09e7de0c - () https://git.kernel.org/stable/c/8164d0efaf370c425dc69a1e8216940d09e7de0c - Patch
References () https://git.kernel.org/stable/c/90bc7f5a244aadee4292b28098b7c98aadd4b3aa - () https://git.kernel.org/stable/c/90bc7f5a244aadee4292b28098b7c98aadd4b3aa - Patch
References () https://git.kernel.org/stable/c/b5ad58285f9217d68cd5ea2ad86ce254a3fe7c4d - () https://git.kernel.org/stable/c/b5ad58285f9217d68cd5ea2ad86ce254a3fe7c4d - Patch
References () https://git.kernel.org/stable/c/ea77c397bff8b6d59f6d83dae1425b08f465e8b5 - () https://git.kernel.org/stable/c/ea77c397bff8b6d59f6d83dae1425b08f465e8b5 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

06 Dec 2025, 22:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/8164d0efaf370c425dc69a1e8216940d09e7de0c -

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nf_set_pipapo_avx2: corrección del relleno inicial del mapa. Si el primer campo no cubre todo el mapa inicial, debemos poner a cero el resto; de lo contrario, filtraremos esos bits al mapa de la siguiente ronda de coincidencia. La corrección inicial estaba incompleta y solo corrigió la implementación genérica de C. Un parche posterior añade un caso de prueba a nft_concat_range.sh.

03 Jul 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-03 09:15

Updated : 2025-12-17 18:49


NVD link : CVE-2025-38120

Mitre link : CVE-2025-38120

CVE.ORG link : CVE-2025-38120


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel