CVE-2025-38097
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/07/2025
Last modified:
03/07/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
espintcp: remove encap socket caching to avoid reference leak<br />
<br />
The current scheme for caching the encap socket can lead to reference<br />
leaks when we try to delete the netns.<br />
<br />
The reference chain is: xfrm_state -> enacp_sk -> netns<br />
<br />
Since the encap socket is a userspace socket, it holds a reference on<br />
the netns. If we delete the espintcp state (through flush or<br />
individual delete) before removing the netns, the reference on the<br />
socket is dropped and the netns is correctly deleted. Otherwise, the<br />
netns may not be reachable anymore (if all processes within the ns<br />
have terminated), so we cannot delete the xfrm state to drop its<br />
reference on the socket.<br />
<br />
This patch results in a small (~2% in my tests) performance<br />
regression.<br />
<br />
A GC-type mechanism could be added for the socket cache, to clear<br />
references if the state hasn&#39;t been used "recently", but it&#39;s a lot<br />
more complex than just not caching the socket.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/028363685bd0b7a19b4a820f82dd905b1dc83999
- https://git.kernel.org/stable/c/74fd327767fb784c5875cf7c4ba1217f26020943
- https://git.kernel.org/stable/c/9cbca30102028f9ad3d2098f935c4368f581fd07
- https://git.kernel.org/stable/c/b58a295d10065960bcb9d60cb8ca6ead9837cd27
- https://git.kernel.org/stable/c/e4cde54b46a87231c77256a633be1bef62687d69