CVE-2025-38551
Linux Kernel vulnerability analysis and mitigation

Overview

A deadlock vulnerability (CVE-2025-38551) was discovered in the Linux kernel's virtio-net driver. The issue was identified in the probe functionality where a recursive rtnl_lock() condition could occur. This vulnerability was recently published on August 16, 2025, and affects the Linux kernel's networking subsystem (NVD).

Technical details

The vulnerability manifests as a deadlock in the virtio-net driver during the probe operation. The issue occurs when a VMM sends a VIRTIONETSANNOUNCE request while the virtio-net driver is still in its probing phase. The deadlock appears in a specific stack trace sequence: virtnetprobe() -> rtnllock() -> virtioconfigchangedwork() -> netdevnotifypeers() -> rtnllock(). The configwork in probe() gets scheduled until virtnetopen() enables the config change notification via virtioconfigdriverenable() (NVD).

Impact

The vulnerability affects the Linux kernel's networking functionality, specifically in the virtio-net driver component. When triggered, it can cause a deadlock condition, potentially affecting system stability and network operations (NVD).

Mitigation and workarounds

The vulnerability has been fixed in certain Linux distributions. According to the Debian security tracker, the fix has been implemented in bullseye, bookworm, and trixie releases, while forky and sid versions remain vulnerable (Debian Tracker).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management