CVE-2025-37894
📋 TL;DR
A NULL pointer dereference vulnerability in the Linux kernel's networking subsystem occurs when sock_put() is incorrectly called on a struct inet_timewait_sock pointer instead of sock_gen_put() when sk_state is TCP_TIME_WAIT. This can cause kernel crashes leading to denial of service. All Linux systems using affected kernel versions are potentially affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and complete denial of service, requiring physical or remote console access to reboot.
Likely Case
System crash or instability when specific network conditions trigger the vulnerable code path, resulting in temporary service disruption.
If Mitigated
No impact if patched; unpatched systems may experience crashes under specific network traffic patterns.
🎯 Exploit Status
Exploitation requires triggering specific network conditions to cause the incorrect pointer dereference.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check kernel commit 786650e644c5b1c063921799ca203c0b8670d79a and backports
Vendor Advisory: https://git.kernel.org/stable/c/786650e644c5b1c063921799ca203c0b8670d79a
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel.
🔧 Temporary Workarounds
No effective workaround
linuxThis is a core kernel networking vulnerability; no configuration changes can mitigate it.
🧯 If You Can't Patch
- Isolate affected systems from untrusted networks
- Implement network segmentation to limit potential trigger traffic
🔍 How to Verify
Check if Vulnerable:
Check kernel version and compare with distribution's patched versions: uname -r
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version matches patched release from your distribution vendor
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- System crash/reboot logs
- Kernel oops messages
Network Indicators:
- Unusual TCP connection patterns triggering TIME_WAIT states
SIEM Query:
Search for kernel panic, oops, or crash events in system logs