CVE-2025-38212

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
04/07/2025
Last modified:
18/12/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ipc: fix to protect IPCS lookups using RCU<br /> <br /> syzbot reported that it discovered a use-after-free vulnerability, [0]<br /> <br /> [0]: https://lore.kernel.org/all/67af13f8.050a0220.21dd3.0038.GAE@google.com/<br /> <br /> idr_for_each() is protected by rwsem, but this is not enough. If it is<br /> not protected by RCU read-critical region, when idr_for_each() calls<br /> radix_tree_node_free() through call_rcu() to free the radix_tree_node<br /> structure, the node will be freed immediately, and when reading the next<br /> node in radix_tree_for_each_slot(), the already freed memory may be read.<br /> <br /> Therefore, we need to add code to make sure that idr_for_each() is<br /> protected within the RCU read-critical region when we call it in<br /> shm_destroy_orphaned().

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.1 (including) 5.4.295 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.239 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.186 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.142 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.95 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.35 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.15.4 (excluding)
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*