CVE-2025-38124
BaseFortify
Publication date: 2025-07-03
Last updated on: 2025-12-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.1.113 (inc) to 6.1.142 (exc) |
| linux | linux_kernel | From 6.6.55 (inc) to 6.6.94 (exc) |
| linux | linux_kernel | From 6.10.14 (inc) to 6.11 (exc) |
| linux | linux_kernel | From 6.11.3 (inc) to 6.12 (exc) |
| linux | linux_kernel | From 6.12.1 (inc) to 6.12.34 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.3 (exc) |
| linux | linux_kernel | 6.12 |
| linux | linux_kernel | 6.12 |
| linux | linux_kernel | 6.12 |
| linux | linux_kernel | 6.12 |
| linux | linux_kernel | 6.12 |
| linux | linux_kernel | 6.12 |
| linux | linux_kernel | 6.12 |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's network stack, specifically related to UDP Generic Segmentation Offload (GSO) and how fragmented packets (frag_list skbs) are handled during segmentation. The issue arises when optional datapath hooks like NAT or BPF modify these fragmented packets, breaking expected conditions and causing invalid packet geometry. This can lead to kernel exceptions or bugs when the kernel tries to segment these packets. The fix involves linearizing packets that fail the basic invariants before segmentation to prevent such errors.
How can this vulnerability impact me? :
This vulnerability can cause kernel exceptions or crashes when processing certain UDP packets that have been modified by datapath hooks, potentially leading to system instability or denial of service. Since it affects the kernel's packet segmentation code, it could disrupt network communication or degrade system reliability under specific network conditions.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for BUG or Oops messages related to skb_segment in net/core/skbuff.c, especially messages indicating invalid geometry in frag_list skbs or kernel BUGs at net/core/skbuff.c:4278. You can use commands like 'dmesg | grep skb_segment' or 'journalctl -k | grep skb_segment' to look for such kernel errors.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix for this vulnerability, which linearizes packets that fail the basic invariants on gso fraglist skbs to prevent exceptions during skb segmentation. Avoid using optional datapath hooks such as NAT and BPF that modify fraglist skbs until the fix is applied.