CVE-2025-37894

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's networking subsystem occurs when sock_put() is incorrectly called on a struct inet_timewait_sock pointer instead of sock_gen_put() when sk_state is TCP_TIME_WAIT. This can cause kernel crashes leading to denial of service. All Linux systems using affected kernel versions are potentially affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE; check kernel commit history for backported fixes.
Operating Systems: All Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in core networking code; no special configuration required to be vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and complete denial of service, requiring physical or remote console access to reboot.

🟠

Likely Case

System crash or instability when specific network conditions trigger the vulnerable code path, resulting in temporary service disruption.

🟢

If Mitigated

No impact if patched; unpatched systems may experience crashes under specific network traffic patterns.

🌐 Internet-Facing: MEDIUM - Exploitation requires specific network traffic patterns but could be triggered by external connections.
🏢 Internal Only: MEDIUM - Internal network traffic could also trigger the vulnerability if conditions are met.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires triggering specific network conditions to cause the incorrect pointer dereference.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check kernel commit 786650e644c5b1c063921799ca203c0b8670d79a and backports

Vendor Advisory: https://git.kernel.org/stable/c/786650e644c5b1c063921799ca203c0b8670d79a

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel.

🔧 Temporary Workarounds

No effective workaround

linux

This is a core kernel networking vulnerability; no configuration changes can mitigate it.

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks
  • Implement network segmentation to limit potential trigger traffic

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with distribution's patched versions: uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version matches patched release from your distribution vendor

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • System crash/reboot logs
  • Kernel oops messages

Network Indicators:

  • Unusual TCP connection patterns triggering TIME_WAIT states

SIEM Query:

Search for kernel panic, oops, or crash events in system logs

🔗 References

📤 Share & Export