CVE-2025-39852

5.5 MEDIUM

📋 TL;DR

A memory leak vulnerability exists in the Linux kernel's TCP-AO (Authentication Option) implementation for IPv6. When TCP connection establishment fails during authentication, the kernel fails to properly clean up socket memory, leading to resource exhaustion. This affects all Linux systems using TCP-AO with IPv6.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Specific affected versions not explicitly stated in CVE; likely affects versions with TCP-AO support before the fix commits
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when TCP-AO (TCP Authentication Option) is configured and used with IPv6 connections; default configurations are not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could lead to kernel memory exhaustion, causing system instability, denial of service, or potential kernel crashes.

🟠

Likely Case

Gradual memory consumption under specific TCP-AO failure conditions, potentially leading to performance degradation or service disruption over time.

🟢

If Mitigated

Minimal impact with proper monitoring and memory limits in place; systems may experience temporary performance issues during attack scenarios.

🌐 Internet-Facing: MEDIUM - Requires specific TCP-AO configuration and IPv6 usage; not all internet-facing systems are vulnerable by default.
🏢 Internal Only: LOW - Requires TCP-AO configuration and IPv6; most internal systems won't have this specific setup enabled.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to trigger TCP-AO authentication failures on IPv6 connections; attacker needs network access to target system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 3d2b356d994a8801acb397cafd28b13672c37ab5, 46d33c878fc0b3d7570366b2c9912395b3f4e701, or fa390321aba0a54d0f7ae95ee4ecde1358bb9234

Vendor Advisory: https://git.kernel.org/stable/c/3d2b356d994a8801acb397cafd28b13672c37ab5

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable TCP-AO

Linux

If TCP-AO authentication is not required, disable it to prevent the vulnerability from being triggered

sysctl -w net.ipv4.tcp_ao=0
sysctl -w net.ipv6.tcp_ao=0

Limit IPv6 TCP connections

Linux

Implement connection rate limiting or firewall rules to restrict IPv6 TCP connections

iptables -A INPUT -p tcp --dport [PORT] -m state --state NEW -m recent --set
iptables -A INPUT -p tcp --dport [PORT] -m state --state NEW -m recent --update --seconds 60 --hitcount 20 -j DROP

🧯 If You Can't Patch

  • Disable TCP-AO authentication if not required for your use case
  • Implement system monitoring for memory consumption and restart services if memory usage becomes excessive

🔍 How to Verify

Check if Vulnerable:

Check if TCP-AO is enabled: sysctl net.ipv4.tcp_ao net.ipv6.tcp_ao; check kernel version against patched versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or is newer than patched versions; confirm TCP-AO functionality works without memory leaks

📡 Detection & Monitoring

Log Indicators:

  • Kernel OOM (Out of Memory) messages
  • System memory exhaustion warnings
  • TCP connection failures with authentication errors

Network Indicators:

  • Unusual TCP connection attempts with authentication options
  • IPv6 TCP traffic patterns causing system resource issues

SIEM Query:

source="kernel" AND ("out of memory" OR "oom" OR "memory allocation failure") AND ("tcp" OR "socket")

🔗 References

📤 Share & Export