Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2025-38678— netfilter: nf_tables: reject duplicate device on updates

AI Predicted 4.3 Difficulty: Moderate EPSS 0.04% · P11

Affected Version Matrix 16

VendorProductVersion RangeStatus
LinuxLinux78d9f48f7f44431a25da2b46b3a8812f6ff2b981< 0521e694d5b80899fba8695881a6349f9bc538cbaffected
78d9f48f7f44431a25da2b46b3a8812f6ff2b981< 4681960bc0f4f8bcc782cbf2fd205f48ad314dfdaffected
78d9f48f7f44431a25da2b46b3a8812f6ff2b981< 4ce2a0c3b8497a66cfc25fc7ca3d087258a785d2affected
78d9f48f7f44431a25da2b46b3a8812f6ff2b981< 3f358a66a04513311668ea4b40f5064e253d8386affected
78d9f48f7f44431a25da2b46b3a8812f6ff2b981< cf23d531a9d496863aa4c5a0e2f71f0a23f3df3caffected
78d9f48f7f44431a25da2b46b3a8812f6ff2b981< d7615bde541f16517d6790412da6ec46fa8a4c1faffected
78d9f48f7f44431a25da2b46b3a8812f6ff2b981< cf5fb87fcdaaaafec55dcc0dc5a9e15ead343973affected
5.8affected
… +8 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-38678

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
netfilter: nf_tables: reject duplicate device on updates
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject duplicate device on updates A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device. Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case. WARNING is hit when unregistering the hook: [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150 [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S 6.16.0+ #170 PREEMPT(full) [...] [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于拒绝重复设备更新,可能导致未注册hook。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 78d9f48f7f44431a25da2b46b3a8812f6ff2b981 ~ 0521e694d5b80899fba8695881a6349f9bc538cb -
LinuxLinux 5.8 -

II. Public POCs for CVE-2025-38678

#POC DescriptionSource LinkShenlong Link
1maybe the first poc for CVE-2025-38678?https://github.com/guard-wait/CVE-2025-38678_POCPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-38678

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-38678

No comments yet


Leave a comment