-
CVE-2025-38097
- EPSS 0.03%
- Published 03.07.2025 08:13:57
- Last modified 03.07.2025 15:13:53
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: espintcp: remove encap socket caching to avoid reference leak The current scheme for caching the encap socket can lead to reference leaks when we try to delete the netns. The reference chain is: xfrm_state -> enacp_sk -> netns Since the encap socket is a userspace socket, it holds a reference on the netns. If we delete the espintcp state (through flush or individual delete) before removing the netns, the reference on the socket is dropped and the netns is correctly deleted. Otherwise, the netns may not be reachable anymore (if all processes within the ns have terminated), so we cannot delete the xfrm state to drop its reference on the socket. This patch results in a small (~2% in my tests) performance regression. A GC-type mechanism could be added for the socket cache, to clear references if the state hasn't been used "recently", but it's a lot more complex than just not caching the socket.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
e4cde54b46a87231c77256a633be1bef62687d69
Version
e27cca96cd68fa2c6814c90f9a1cfd36bb68c593
Status
affected
Version <
b58a295d10065960bcb9d60cb8ca6ead9837cd27
Version
e27cca96cd68fa2c6814c90f9a1cfd36bb68c593
Status
affected
Version <
9cbca30102028f9ad3d2098f935c4368f581fd07
Version
e27cca96cd68fa2c6814c90f9a1cfd36bb68c593
Status
affected
Version <
74fd327767fb784c5875cf7c4ba1217f26020943
Version
e27cca96cd68fa2c6814c90f9a1cfd36bb68c593
Status
affected
Version <
028363685bd0b7a19b4a820f82dd905b1dc83999
Version
e27cca96cd68fa2c6814c90f9a1cfd36bb68c593
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.6
Status
affected
Version <
5.6
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.141
Status
unaffected
Version <=
6.6.*
Version
6.6.93
Status
unaffected
Version <=
6.12.*
Version
6.12.31
Status
unaffected
Version <=
6.14.*
Version
6.14.9
Status
unaffected
Version <=
*
Version
6.15
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.058 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|