CVE-2025-38165
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/07/2025
Last modified:
18/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf, sockmap: Fix panic when calling skb_linearize<br />
<br />
The panic can be reproduced by executing the command:<br />
./bench sockmap -c 2 -p 1 -a --rx-verdict-ingress --rx-strp 100000<br />
<br />
Then a kernel panic was captured:<br />
&#39;&#39;&#39;<br />
[ 657.460555] kernel BUG at net/core/skbuff.c:2178!<br />
[ 657.462680] Tainted: [W]=WARN<br />
[ 657.463287] Workqueue: events sk_psock_backlog<br />
...<br />
[ 657.469610] <br />
[ 657.469738] ? die+0x36/0x90<br />
[ 657.469916] ? do_trap+0x1d0/0x270<br />
[ 657.470118] ? pskb_expand_head+0x612/0xf40<br />
[ 657.470376] ? pskb_expand_head+0x612/0xf40<br />
[ 657.470620] ? do_error_trap+0xa3/0x170<br />
[ 657.470846] ? pskb_expand_head+0x612/0xf40<br />
[ 657.471092] ? handle_invalid_op+0x2c/0x40<br />
[ 657.471335] ? pskb_expand_head+0x612/0xf40<br />
[ 657.471579] ? exc_invalid_op+0x2d/0x40<br />
[ 657.471805] ? asm_exc_invalid_op+0x1a/0x20<br />
[ 657.472052] ? pskb_expand_head+0xd1/0xf40<br />
[ 657.472292] ? pskb_expand_head+0x612/0xf40<br />
[ 657.472540] ? lock_acquire+0x18f/0x4e0<br />
[ 657.472766] ? find_held_lock+0x2d/0x110<br />
[ 657.472999] ? __pfx_pskb_expand_head+0x10/0x10<br />
[ 657.473263] ? __kmalloc_cache_noprof+0x5b/0x470<br />
[ 657.473537] ? __pfx___lock_release.isra.0+0x10/0x10<br />
[ 657.473826] __pskb_pull_tail+0xfd/0x1d20<br />
[ 657.474062] ? __kasan_slab_alloc+0x4e/0x90<br />
[ 657.474707] sk_psock_skb_ingress_enqueue+0x3bf/0x510<br />
[ 657.475392] ? __kasan_kmalloc+0xaa/0xb0<br />
[ 657.476010] sk_psock_backlog+0x5cf/0xd70<br />
[ 657.476637] process_one_work+0x858/0x1a20<br />
&#39;&#39;&#39;<br />
<br />
The panic originates from the assertion BUG_ON(skb_shared(skb)) in<br />
skb_linearize(). A previous commit(see Fixes tag) introduced skb_get()<br />
to avoid race conditions between skb operations in the backlog and skb<br />
release in the recvmsg path. However, this caused the panic to always<br />
occur when skb_linearize is executed.<br />
<br />
The "--rx-strp 100000" parameter forces the RX path to use the strparser<br />
module which aggregates data until it reaches 100KB before calling sockmap<br />
logic. The 100KB payload exceeds MAX_MSG_FRAGS, triggering skb_linearize.<br />
<br />
To fix this issue, just move skb_get into sk_psock_skb_ingress_enqueue.<br />
<br />
&#39;&#39;&#39;<br />
sk_psock_backlog:<br />
sk_psock_handle_skb<br />
skb_get(skb)
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.54 (including) | 6.1.142 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.5.4 (including) | 6.6.94 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.34 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.15.189:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3d25fa2d7f127348c818e1dab9e58534f7ac56cc
- https://git.kernel.org/stable/c/4dba44333a11522df54b49aa1f2edfaf6ce35fc7
- https://git.kernel.org/stable/c/5ca2e29f6834c64c0e5a9ccf1278c21fb49b827e
- https://git.kernel.org/stable/c/9718ba6490732dbe70190d42c21deb1440834402
- https://git.kernel.org/stable/c/db1d15a26f21f97459508c42ae87cabe8d3afc3b
- https://git.kernel.org/stable/c/e9c1299d813fc04668042690f2c3cc76d013959a
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



