CVE-2025-38718
BaseFortify
Publication date: 2025-09-04
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.10.244-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the SCTP (Stream Control Transmission Protocol) network code. Specifically, cloned GSO (Generic Segmentation Offload) packets share fragment skbs (socket buffers) with the original packets, which is unsafe. This leads to use-of-uninitialized-memory bugs in the SCTP receive path, causing potential kernel memory errors. The issue was fixed by linearizing cloned GSO packets in the sctp_rcv() function to prevent unsafe access.
How can this vulnerability impact me? :
The vulnerability can cause kernel memory corruption due to use of uninitialized memory in the SCTP networking code. This may lead to system instability, crashes, or potentially allow attackers to exploit the kernel memory corruption for privilege escalation or denial of service. However, specific impacts depend on the environment and usage of SCTP.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by a patch that linearizes cloned gso packets in sctp_rcv(). To mitigate this vulnerability, you should update your Linux kernel to a version that includes this patch resolving the use-of-uninitialized-memory bugs in the SCTP implementation.