CVE-2025-39913
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's tcp_bpf component. When a specific function, tcp_bpf_send_verdict(), tries to allocate memory for a psock->cork structure to hold data, the allocation can fail silently due to fault injection combined with a no-warning allocation flag (__GFP_NOWARN). This failure causes the system to not properly revert changes made during the allocation attempt, potentially leading to incorrect handling of socket data. The issue arises when sending data smaller than a specified cork_bytes value, causing data to be carried over improperly to the next send operation. The fix involves calling sk_msg_free() to clean up when allocation fails and ensuring the sendmsg() call returns an appropriate error.
How can this vulnerability impact me? :
This vulnerability can lead to improper handling of socket data in the Linux kernel, potentially causing data to be incorrectly carried over between send operations or resource mismanagement. While the exact impact is not detailed, such issues could result in unexpected behavior in network communication, possible data corruption, or kernel instability.