CVE-2025-38181
BaseFortify
Publication date: 2025-07-04
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.8 (inc) to 5.4.295 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.239 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.186 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.142 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.95 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.35 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.4 (exc) |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a null pointer dereference in the Linux kernel's CALIPSO module, specifically in the functions calipso_req_setattr() and calipso_req_delattr(). It occurs when the kernel tries to allocate a CALIPSO option and fetches a null struct sock due to changes related to SYN Cookie handling. This can cause a general protection fault (crash) when the kernel dereferences a null pointer. The issue arises because the reqsk->rsk_listener pointer can be NULL when SYN Cookies are used, leading to the null pointer dereference. The fix involves returning an error in these functions when SYN Cookies are involved, preventing the null pointer dereference.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (general protection fault) due to a null pointer dereference when handling CALIPSO options in TCP connections that use SYN Cookies. This can lead to denial of service (DoS) conditions where network connections time out or fail to establish properly, impacting system stability and network availability.