CVE-2025-38471
BaseFortify
Publication date: 2025-07-28
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's TLS implementation. Due to recent changes in TCP that compact socket buffers (skbs) more aggressively, the TLS code may attempt to operate on an old skb that has already been freed when checking if all skbs in the queue have matching decrypt state and geometry. This can lead to a kernel bug detected by KASAN (Kernel Address Sanitizer). The fix involves always refreshing the queue when reading the socket to avoid using stale skbs.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash or instability due to use-after-free errors in the TLS code path. It may lead to denial of service or unpredictable behavior in applications relying on TLS over TCP in the Linux kernel. Exploiting this bug could potentially compromise system stability or security.