CVE-2025-38097
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/07/2025
Last modified:
16/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
espintcp: remove encap socket caching to avoid reference leak<br />
<br />
The current scheme for caching the encap socket can lead to reference<br />
leaks when we try to delete the netns.<br />
<br />
The reference chain is: xfrm_state -> enacp_sk -> netns<br />
<br />
Since the encap socket is a userspace socket, it holds a reference on<br />
the netns. If we delete the espintcp state (through flush or<br />
individual delete) before removing the netns, the reference on the<br />
socket is dropped and the netns is correctly deleted. Otherwise, the<br />
netns may not be reachable anymore (if all processes within the ns<br />
have terminated), so we cannot delete the xfrm state to drop its<br />
reference on the socket.<br />
<br />
This patch results in a small (~2% in my tests) performance<br />
regression.<br />
<br />
A GC-type mechanism could be added for the socket cache, to clear<br />
references if the state hasn&#39;t been used "recently", but it&#39;s a lot<br />
more complex than just not caching the socket.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.6 (including) | 6.1.141 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.93 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.31 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.14.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/028363685bd0b7a19b4a820f82dd905b1dc83999
- https://git.kernel.org/stable/c/74fd327767fb784c5875cf7c4ba1217f26020943
- https://git.kernel.org/stable/c/9cbca30102028f9ad3d2098f935c4368f581fd07
- https://git.kernel.org/stable/c/b58a295d10065960bcb9d60cb8ca6ead9837cd27
- https://git.kernel.org/stable/c/e4cde54b46a87231c77256a633be1bef62687d69
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



