-
CVE-2025-38732
- EPSS 0.04%
- Veröffentlicht 05.09.2025 17:20:31
- Zuletzt bearbeitet 08.09.2025 16:25:59
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject: don't leak dst refcount for loopback packets recent patches to add a WARN() when replacing skb dst entry found an old bug: WARNING: include/linux/skbuff.h:1165 skb_dst_check_unset include/linux/skbuff.h:1164 [inline] WARNING: include/linux/skbuff.h:1165 skb_dst_set include/linux/skbuff.h:1210 [inline] WARNING: include/linux/skbuff.h:1165 nf_reject_fill_skb_dst+0x2a4/0x330 net/ipv4/netfilter/nf_reject_ipv4.c:234 [..] Call Trace: nf_send_unreach+0x17b/0x6e0 net/ipv4/netfilter/nf_reject_ipv4.c:325 nft_reject_inet_eval+0x4bc/0x690 net/netfilter/nft_reject_inet.c:27 expr_call_ops_eval net/netfilter/nf_tables_core.c:237 [inline] .. This is because blamed commit forgot about loopback packets. Such packets already have a dst_entry attached, even at PRE_ROUTING stage. Instead of checking hook just check if the skb already has a route attached to it.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
7b8b503c06274ef3c6c1a107743f1ec0d0a53ef8
Version
f53b9b0bdc59c0823679f2e3214e0d538f5951b9
Status
affected
Version <
82ef97abf22790182f7d433c74960dfd61b99c33
Version
f53b9b0bdc59c0823679f2e3214e0d538f5951b9
Status
affected
Version <
b7a885ba25960c91db237c3f83b4285156789bce
Version
f53b9b0bdc59c0823679f2e3214e0d538f5951b9
Status
affected
Version <
a0a3ace2a57887dac1e7c9a724846040c3e31868
Version
f53b9b0bdc59c0823679f2e3214e0d538f5951b9
Status
affected
Version <
51e8531371f90bee742c63775c9a568e5d6bf3c5
Version
f53b9b0bdc59c0823679f2e3214e0d538f5951b9
Status
affected
Version <
b32e1590a8d22cf7d7f965e46d5576051acf8e42
Version
f53b9b0bdc59c0823679f2e3214e0d538f5951b9
Status
affected
Version <
91a79b792204313153e1bdbbe5acbfc28903b3a5
Version
f53b9b0bdc59c0823679f2e3214e0d538f5951b9
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.9
Status
affected
Version <
5.9
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.241
Status
unaffected
Version <=
5.15.*
Version
5.15.190
Status
unaffected
Version <=
6.1.*
Version
6.1.149
Status
unaffected
Version <=
6.6.*
Version
6.6.103
Status
unaffected
Version <=
6.12.*
Version
6.12.44
Status
unaffected
Version <=
6.16.*
Version
6.16.4
Status
unaffected
Version <=
*
Version
6.17-rc3
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.092 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|