CVE-2025-38463
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-191 | The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves incorrect handling of signedness in the calculation of remaining space in an skb (socket buffer) during TCP data transmission. Specifically, a signed integer and an unsigned integer are mixed in a subtraction operation, causing the result to be incorrectly interpreted as a large positive number instead of a negative one. This leads to an overflow in the sk_forward_alloc variable, which tracks allocated memory for TCP data. The overflow can cause sk_forward_alloc to wrap around and become negative, potentially leading to unexpected behavior or memory allocation issues.
How can this vulnerability impact me? :
This vulnerability can cause the sk_forward_alloc variable in the Linux kernel TCP stack to overflow and wrap around to a negative value. This may lead to incorrect memory allocation accounting, potentially causing memory corruption, instability, or denial of service in systems using the affected kernel. Attackers might exploit this to disrupt network communications or cause kernel crashes.