CVE-2025-39797
BaseFortify
Publication date: 2025-09-12
Last updated on: 2025-11-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's handling of Security Parameter Indexes (SPIs) for inbound Security Associations (SAs) when using Strongswan. The kernel function xfrm_alloc_spi() can mistakenly assign the same SPI to multiple inbound SAs if the SPI pool is exhausted, leading to duplicate SPIs differentiated only by destination addresses. This causes inconsistencies during SPI lookups, as the lookup may return an arbitrary SA among those with the same SPI, potentially causing packet processing failures and packet drops.
How can this vulnerability impact me? :
The vulnerability can cause packet processing failures and packet drops because the kernel may return an incorrect or arbitrary Security Association during SPI lookup when duplicate SPIs exist. This can disrupt secure communications relying on these SAs, potentially leading to loss of data packets or communication interruptions.