CVE-2025-38236

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38236
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38236.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38236
Downstream
Related
Published
2025-07-08T07:35:23.238Z
Modified
2025-11-28T02:35:22.171510Z
Summary
af_unix: Don't leave consecutive consumed OOB skbs.
Details

In the Linux kernel, the following vulnerability has been resolved:

af_unix: Don't leave consecutive consumed OOB skbs.

Jann Horn reported a use-after-free in unixstreamread_generic().

The following sequences reproduce the issue:

$ python3 from socket import * s1, s2 = socketpair(AFUNIX, SOCKSTREAM) s1.send(b'x', MSGOOB) s2.recv(1, MSGOOB) # leave a consumed OOB skb s1.send(b'y', MSGOOB) s2.recv(1, MSGOOB) # leave a consumed OOB skb s1.send(b'z', MSGOOB) s2.recv(1) # recv 'z' illegally s2.recv(1, MSGOOB) # access 'z' skb (use-after-free)

Even though a user reads OOB data, the skb holding the data stays on the recv queue to mark the OOB boundary and break the next recv().

After the last send() in the scenario above, the sk2's recv queue has 2 leading consumed OOB skbs and 1 real OOB skb.

Then, the following happens during the next recv() without MSG_OOB

  1. unixstreamread_generic() peeks the first consumed OOB skb
  2. manage_oob() returns the next consumed OOB skb
  3. unixstreamread_generic() fetches the next not-yet-consumed OOB skb
  4. unixstreamread_generic() reads and frees the OOB skb

, and the last recv(MSG_OOB) triggers KASAN splat.

The 3. above occurs because of the SOPEEKOFF code, which does not expect unixskblen(skb) to be 0, but this is true for such consumed OOB skbs.

while (skip >= unixskblen(skb)) { skip -= unixskblen(skb); skb = skbpeeknext(skb, &sk->skreceivequeue); ... }

In addition to this use-after-free, there is another issue that ioctl(SIOCATMARK) does not function properly with consecutive consumed OOB skbs.

So, nothing good comes out of such a situation.

Instead of complicating manage_oob(), ioctl() handling, and the next ECONNRESET fix by introducing a loop for consecutive consumed OOB skbs, let's not leave such consecutive OOB unnecessarily.

Now, while receiving an OOB skb in unixstreamrecv_urg(), if its previous skb is a consumed OOB skb, it is freed.

Read of size 4 at addr ffff888106ef2904 by task python3/315

CPU: 2 UID: 0 PID: 315 Comm: python3 Not tainted 6.16.0-rc1-00407-gec315832f6f9 #8 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-4.fc42 04/01/2014 Call Trace: <TASK> dumpstacklvl (lib/dumpstack.c:122) printreport (mm/kasan/report.c:409 mm/kasan/report.c:521) kasanreport (mm/kasan/report.c:636) unixstreamreadactor (net/unix/afunix.c:3027) unixstreamreadgeneric (net/unix/afunix.c:2708 net/unix/afunix.c:2847) unixstreamrecvmsg (net/unix/afunix.c:3048) sockrecvmsg (net/socket.c:1063 (discriminator 20) net/socket.c:1085 (discriminator 20)) _sysrecvfrom (net/socket.c:2278) _x64sysrecvfrom (net/socket.c:2291 (discriminator 1) net/socket.c:2287 (discriminator 1) net/socket.c:2287 (discriminator 1)) dosyscall64 (arch/x86/entry/syscall64.c:63 (discriminator 1) arch/x86/entry/syscall64.c:94 (discriminator 1)) entrySYSCALL64afterhwframe (arch/x86/entry/entry64.S:130) RIP: 0033:0x7f8911fcea06 Code: 5d e8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 75 19 83 e2 39 83 fa 08 75 11 e8 26 ff ff ff 66 0f 1f 44 00 00 48 8b 45 10 0f 05 <48> 8b 5d f8 c9 c3 0f 1f 40 00 f3 0f 1e fa 55 48 89 e5 48 83 ec 08 RSP: 002b:00007fffdb0dccb0 EFLAGS: 00000202 ORIG_RAX: 000000000000002d RAX: ffffffffffffffda RBX: 00007fffdb0dcdc8 RCX: 00007f8911fcea06 RDX: 0000000000000001 RSI: 00007f8911a5e060 RDI: 0000000000000006 RBP: 00007fffdb0dccd0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000202 R12: 00007f89119a7d20 R13: ffffffffc4653600 R14: 0000000000000000 R15: 0000000000000000 </TASK>

Allocated by task 315: kasansavestack (mm/kasan/common.c:48) kasansavetrack (mm/kasan/common.c:60 (discriminator 1) mm/kasan/common.c:69 (discriminator 1)) _kasanslaballoc (mm/kasan/common.c:348) kmemcachealloc ---truncated---

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38236.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
314001f0bf927015e459c9d387d62a231fe93af3
Fixed
523edfed4f68b7794d85b9ac828c5f8f4442e4c5
Fixed
a12237865b48a73183df252029ff5065d73d305e
Fixed
fad0a2c16062ac7c606b93166a7ce9d265bab976
Fixed
61a9ad7b69ce688697e5f63332f03e17725353bc
Fixed
8db4d2d026e6e3649832bfe23b96c4acff0756db
Fixed
32ca245464e1479bfea8592b9db227fdc1641705

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
5.15.194
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.143
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.96
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.36
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.5