PT-2025-31070 · Linux · Linux Kernel

Published

2025-07-28

·

Updated

2025-07-28

·

CVE-2025-38473

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.

**Name of the Vulnerable Software and Affected Versions:**

Linux kernel versions prior to 6.16.0-rc4-syzkaller-g7482bb149b9f

**Description:**

The Linux kernel contained a null-pointer dereference issue within the `l2cap sock resume cb()` function, identified by syzbot. This issue stemmed from a potential access to a killed socket within the function, similar to a previously fixed use-after-free error in `lock sock nested()`. The vulnerability was triggered during the execution of `l2cap sock resume cb()` and could lead to system instability. The issue was reported through a KASAN (Kernel Address Sanitizer) report, indicating a write operation to an invalid memory address.

**Recommendations:**

Linux kernel versions prior to 6.16.0-rc4-syzkaller-g7482bb149b9f should be updated to version 6.16.0-rc4-syzkaller-g7482bb149b9f or later to resolve this issue.

Related Identifiers

CVE-2025-38473

Affected Products

Linux Kernel