CVE-2025-38472
BaseFortify
Publication date: 2025-07-28
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's netfilter connection tracking (nf_conntrack) subsystem. It occurs when multiple CPUs concurrently access and modify a connection tracking entry that is in a partially initialized state. Specifically, one CPU may delete and reinitialize an entry while another CPU is still processing it, leading to inconsistent internal pointers and status flags. This can cause a crash when the system tries to unlink the corrupted entry from the hash bucket list. The root cause is the premature setting of the CONFIRMED status bit before the entry is fully inserted into the hash table, which leads to improper handling of the entry during garbage collection and deletion.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a use-after-free or invalid pointer dereference in the connection tracking subsystem. Such a crash can lead to denial of service (DoS) by disrupting network connectivity or causing system instability. Systems relying on netfilter for firewalling or network address translation may experience unexpected reboots or loss of network functionality.