CVE-2025-38112

4.7 MEDIUM

📋 TL;DR

A race condition vulnerability in the Linux kernel's sk_is_readable() function can cause a null pointer dereference when sockets are removed from sockmaps. This affects Linux systems using sockmap functionality, potentially leading to kernel crashes or denial of service. The vulnerability requires specific conditions to trigger but affects all Linux distributions with vulnerable kernel versions.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions containing the vulnerable code (specific versions depend on distribution backports)
Operating Systems: All Linux distributions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires sockmap functionality to be used. Vulnerability triggers during specific timing conditions when sockets are removed from sockmaps.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical reboot of affected systems.

🟠

Likely Case

Local denial of service through kernel crash when specific socket operations occur during sockmap removal.

🟢

If Mitigated

Minor performance impact or no effect if vulnerable code path isn't triggered.

🌐 Internet-Facing: LOW - Requires local access or ability to execute code on the system to trigger the race condition.
🏢 Internal Only: MEDIUM - Local users or processes could potentially crash the kernel, affecting system availability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires precise timing to trigger the race condition and local access to the system. No known public exploits at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel commits: 1b367ba2f94251822577daed031d6b9a9e11ba91, 1e0de7582ceccbdbb227d4e0ddf65732f92526da, 2660a544fdc0940bba15f70508a46cf9a6491230, 6fa68d7eab34d448a61aa24ea31e68b3231ed20d, 8926a7ef1977a832dd6bf702f1a99303dbf15b15

Vendor Advisory: https://git.kernel.org/stable/c/

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check with your Linux distribution for specific patched kernel versions. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable sockmap functionality

linux

Prevent use of sockmap features which trigger the vulnerable code path

echo 'blacklist sockmap' >> /etc/modprobe.d/blacklist.conf
rmmod sockmap

🧯 If You Can't Patch

  • Restrict local user access to prevent potential exploitation
  • Monitor system logs for kernel panic events and implement high availability solutions

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with distribution's patched versions. Vulnerable if using unpatched kernel with sockmap functionality.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits: 'uname -r' and check with distribution's security advisories.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/messages or dmesg
  • Null pointer dereference errors in kernel logs

Network Indicators:

  • Sudden loss of network connectivity on affected systems

SIEM Query:

source="kernel" AND ("panic" OR "NULL pointer dereference" OR "Oops")

🔗 References

📤 Share & Export