In the Linux kernel, the following vulnerability has been resolved:
net: Fix TOCTOU issue in sk_is_readable()
sk->sk_prot->sock_is_readable is a valid function pointer when sk resides
in a sockmap. After the last sk_psock_put() (which usually happens when
socket is removed from sockmap), sk->sk_prot gets restored and
sk->sk_prot->sock_is_readable becomes NULL.
This makes sk_is_readable() racy, if the value of sk->sk_prot is reloaded
after the initial check. Which in turn may lead to a null pointer
dereference.
Ensure the function pointer does not turn NULL after the check.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Dec 2025, 18:13
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CWE | CWE-367 | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/1b367ba2f94251822577daed031d6b9a9e11ba91 - Patch | |
| References | () https://git.kernel.org/stable/c/1e0de7582ceccbdbb227d4e0ddf65732f92526da - Patch | |
| References | () https://git.kernel.org/stable/c/2660a544fdc0940bba15f70508a46cf9a6491230 - Patch | |
| References | () https://git.kernel.org/stable/c/6fa68d7eab34d448a61aa24ea31e68b3231ed20d - Patch | |
| References | () https://git.kernel.org/stable/c/8926a7ef1977a832dd6bf702f1a99303dbf15b15 - Patch | |
| References | () https://git.kernel.org/stable/c/c2b26638476baee154920bb587fc94ff1bf04336 - Patch | |
| References | () https://git.kernel.org/stable/c/ff55c85a923e043d59d26b20a673a1b4a219c310 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
03 Jul 2025, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-03 09:15
Updated : 2025-12-17 18:13
NVD link : CVE-2025-38112
Mitre link : CVE-2025-38112
CVE.ORG link : CVE-2025-38112
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
