CVE-2025-38732
BaseFortify
Publication date: 2025-09-05
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | 5.10.244-1 |
| linux | kernel | 6.1.153-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's netfilter component involves improper handling of loopback packets in the nf_reject module. Specifically, a recent patch added warnings when replacing the skb (socket buffer) destination entry but overlooked that loopback packets already have a destination entry attached even at the PRE_ROUTING stage. This caused a reference count leak for the destination entry of loopback packets. The fix involves checking if the skb already has a route attached rather than relying on the hook stage.
How can this vulnerability impact me? :
The vulnerability can lead to a leak of the destination reference count for loopback packets, which may cause resource mismanagement within the kernel's networking stack. This could potentially result in degraded system performance or instability due to improper handling of network packet routing information.