CVE-2025-38476
BaseFortify
Publication date: 2025-07-28
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's rpl_do_srh_inline() function. The function accesses an IPv6 header after it may have been freed due to skb_cow_head(), which is illegal and causes a memory safety issue. This was fixed by changing a pointer to a local struct to prevent accessing freed memory.
How can this vulnerability impact me? :
This vulnerability can lead to a use-after-free condition, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or cause denial of service by exploiting the illegal memory access in the kernel networking code.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by running the selftest script lwt_dst_cache_ref_loop.sh with Kernel Address Sanitizer (KASAN) enabled. The test triggers a use-after-free bug in rpl_do_srh_inline(), which will produce a KASAN error report similar to the one shown in the description. The command to run is: ./lwt_dst_cache_ref_loop.sh
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the use-after-free bug in rpl_do_srh_inline() has been fixed. The fix involves changing oldhdr to a local struct instead of a pointer to prevent illegal access after skb_cow_head(). Until the update is applied, avoid running affected IPv6 routing protocols or code paths that trigger this vulnerability.