Executive Summary

Informations
Name CVE-2025-38097 First vendor Publication 2025-07-03
Vendor Cve Last vendor Modification 2025-07-03

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

espintcp: remove encap socket caching to avoid reference leak

The current scheme for caching the encap socket can lead to reference leaks when we try to delete the netns.

The reference chain is: xfrm_state -> enacp_sk -> netns

Since the encap socket is a userspace socket, it holds a reference on the netns. If we delete the espintcp state (through flush or individual delete) before removing the netns, the reference on the socket is dropped and the netns is correctly deleted. Otherwise, the netns may not be reachable anymore (if all processes within the ns have terminated), so we cannot delete the xfrm state to drop its reference on the socket.

This patch results in a small (~2% in my tests) performance regression.

A GC-type mechanism could be added for the socket cache, to clear references if the state hasn't been used "recently", but it's a lot more complex than just not caching the socket.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38097

Sources (Detail)

https://git.kernel.org/stable/c/028363685bd0b7a19b4a820f82dd905b1dc83999
https://git.kernel.org/stable/c/74fd327767fb784c5875cf7c4ba1217f26020943
https://git.kernel.org/stable/c/9cbca30102028f9ad3d2098f935c4368f581fd07
https://git.kernel.org/stable/c/b58a295d10065960bcb9d60cb8ca6ead9837cd27
https://git.kernel.org/stable/c/e4cde54b46a87231c77256a633be1bef62687d69
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2025-07-05 02:31:46
  • Multiple Updates
2025-07-05 02:31:17
  • Multiple Updates
2025-07-04 17:20:34
  • Multiple Updates
2025-07-03 13:20:38
  • First insertion