CVE-2025-38589
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2025-38589 is a vulnerability in the Linux kernel that was discovered and reported on August 19, 2025. The vulnerability involves a null pointer dereference in the neighflushdev() function. The issue arose when a commit introduced per-netdev neighbour list and converted neighflushdev() to use it instead of the global hash table, but missed handling the case where neightableclear() calls neigh_ifdown() with NULL dev (NVD).

Technical details

The vulnerability is a null pointer dereference issue in the Linux kernel's networking subsystem, specifically in the neighflushdev() function. The problem occurs when neightableclear() calls neigh_ifdown() with a NULL device pointer. This vulnerability affects the IPv6 module initialization process, though it's noted that the IPv6 module is no longer unloadable and this condition only occurs when IPv6 fails to initialize, which is considered unlikely (NVD). According to Oracle Linux's assessment, this vulnerability has a CVSS score of 5.5 (Low) with attack vector being Local, attack complexity Low, and low privileges required (Oracle Linux).

Impact

The impact of this vulnerability is primarily related to system stability and availability. When triggered, it can cause a kernel oops with a general protection fault, potentially leading to system instability or denial of service. The vulnerability specifically affects the IPv6 initialization process, though the actual impact is limited due to the IPv6 module being non-unloadable in current implementations (NVD).

Mitigation and workarounds

The vulnerability has been resolved in the Linux kernel through a patch that restores the hash table iteration functionality. The fix involves ensuring proper handling of NULL device pointers in the neighflushdev() function (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management