CVE-2025-38112

MEDIUM

Linux kernel - Info Disclosure

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: net: Fix TOCTOU issue in sk_is_readable() sk->sk_prot->sock_is_readable is a valid function pointer when sk resides in a sockmap. After the last sk_psock_put() (which usually happens when socket is removed from sockmap), sk->sk_prot gets restored and sk->sk_prot->sock_is_readable becomes NULL. This makes sk_is_readable() racy, if the value of sk->sk_prot is reloaded after the initial check. Which in turn may lead to a null pointer dereference. Ensure the function pointer does not turn NULL after the check.

Scores

CVSS v3 4.7
EPSS 0.0009
EPSS Percentile 25.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-367
Status published
Products (9)
debian/debian_linux 11.0
linux/Kernel 4.17.0 - 5.10.239linux
linux/Kernel 5.11.0 - 5.15.186linux
linux/Kernel 5.16.0 - 6.1.142linux
linux/Kernel 6.13.0 - 6.15.3linux
linux/Kernel 6.2.0 - 6.6.94linux
linux/Kernel 6.7.0 - 6.12.34linux
linux/linux_kernel 6.16 rc1
linux/linux_kernel 4.17 - 5.10.239
Published Jul 03, 2025
Tracked Since Feb 18, 2026