CVE-2025-38057

5.5 MEDIUM

📋 TL;DR

This CVE describes a memory leak vulnerability in the Linux kernel's espintcp module where certain error paths fail to free socket buffers (skb). This affects systems using IPsec ESP in TCP mode and could lead to resource exhaustion. All Linux systems with the vulnerable kernel code are potentially affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific kernel versions containing the vulnerable espintcp code (exact range depends on distribution backports)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when IPsec ESP in TCP mode is configured and used. Most systems don't use this feature by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could cause kernel memory exhaustion leading to system instability, denial of service, or potential kernel panic.

🟠

Likely Case

Intermittent memory leaks under specific error conditions, potentially causing performance degradation or service disruption over time.

🟢

If Mitigated

With proper monitoring and resource limits, impact would be limited to occasional performance issues that can be detected and addressed.

🌐 Internet-Facing: MEDIUM - Systems using IPsec ESP in TCP mode exposed to the internet could be targeted to cause denial of service.
🏢 Internal Only: LOW - Internal systems would only be affected if they experience the specific error conditions that trigger the leak.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific error conditions in the espintcp module, which may require network access and specific IPsec configurations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing the fixes from the provided git commits

Vendor Advisory: https://git.kernel.org/stable/c/05db2b850a2b8b17f3d1799f563ea1d550e05ed5

Restart Required: Yes

Instructions:

1. Update to a patched kernel version from your distribution vendor. 2. Reboot the system to load the new kernel. 3. Verify the kernel version after reboot.

🔧 Temporary Workarounds

Disable IPsec ESP in TCP mode

linux

If not required, disable the espintcp module or IPsec ESP in TCP mode configuration

Check if espintcp is loaded: lsmod | grep espintcp
Unload module: rmmod espintcp

🧯 If You Can't Patch

  • Monitor kernel memory usage and system stability metrics
  • Implement network controls to limit traffic to IPsec ESP in TCP mode services

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with distribution security advisories. Check if espintcp module is loaded: lsmod | grep espintcp

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update matches patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Kernel oom-killer messages
  • System instability or crash reports
  • Memory exhaustion warnings in system logs

Network Indicators:

  • Unusual traffic patterns targeting IPsec services
  • Connection attempts to trigger espintcp error conditions

SIEM Query:

source="kernel" AND ("oom" OR "out of memory" OR "panic") AND host contains affected systems

🔗 References

📤 Share & Export