CVE-2025-38037
Linux Kernel vulnerability analysis and mitigation

Overview

A data race vulnerability was identified in the Linux kernel's VXLAN implementation (CVE-2025-38037), discovered on June 18, 2025. The vulnerability affects the 'used' and 'updated' fields in the FDB (Forwarding Database) entry structure, which can be accessed concurrently by multiple threads (NVD CVE, Debian Tracker).

Technical details

The vulnerability exists in the VXLAN implementation where concurrent access to FDB entry structure fields occurs without proper synchronization. The issue manifests when multiple threads simultaneously access the 'used' and 'updated' fields, leading to potential data races. The vulnerability was detected by the Kernel Concurrency Sanitizer (KCSAN) and can be reproduced using specific test cases involving concurrent VXLAN packet transmission (NVD CVE).

Impact

The data race condition affects Linux kernel versions up to 6.13.0-rc7, potentially impacting systems using VXLAN networking features. Affected Debian releases include bullseye, bookworm, and trixie versions prior to the fix (Debian Tracker).

Mitigation and workarounds

The vulnerability has been fixed in Linux kernel version 6.12.32-1 and later by implementing proper synchronization using READONCE() and WRITEONCE() operations for accessing the affected FDB entry fields. Users are advised to upgrade to the fixed version (Debian Tracker).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management