-

CVE-2025-38097

In the Linux kernel, the following vulnerability has been resolved:

espintcp: remove encap socket caching to avoid reference leak

The current scheme for caching the encap socket can lead to reference
leaks when we try to delete the netns.

The reference chain is: xfrm_state -> enacp_sk -> netns

Since the encap socket is a userspace socket, it holds a reference on
the netns. If we delete the espintcp state (through flush or
individual delete) before removing the netns, the reference on the
socket is dropped and the netns is correctly deleted. Otherwise, the
netns may not be reachable anymore (if all processes within the ns
have terminated), so we cannot delete the xfrm state to drop its
reference on the socket.

This patch results in a small (~2% in my tests) performance
regression.

A GC-type mechanism could be added for the socket cache, to clear
references if the state hasn't been used "recently", but it's a lot
more complex than just not caching the socket.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < e4cde54b46a87231c77256a633be1bef62687d69
Version e27cca96cd68fa2c6814c90f9a1cfd36bb68c593
Status affected
Version < b58a295d10065960bcb9d60cb8ca6ead9837cd27
Version e27cca96cd68fa2c6814c90f9a1cfd36bb68c593
Status affected
Version < 9cbca30102028f9ad3d2098f935c4368f581fd07
Version e27cca96cd68fa2c6814c90f9a1cfd36bb68c593
Status affected
Version < 74fd327767fb784c5875cf7c4ba1217f26020943
Version e27cca96cd68fa2c6814c90f9a1cfd36bb68c593
Status affected
Version < 028363685bd0b7a19b4a820f82dd905b1dc83999
Version e27cca96cd68fa2c6814c90f9a1cfd36bb68c593
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.6
Status affected
Version < 5.6
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.141
Status unaffected
Version <= 6.6.*
Version 6.6.93
Status unaffected
Version <= 6.12.*
Version 6.12.31
Status unaffected
Version <= 6.14.*
Version 6.14.9
Status unaffected
Version <= *
Version 6.15
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.058
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String