CVE-2025-38273

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/07/2025
Last modified:
18/12/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: tipc: fix refcount warning in tipc_aead_encrypt<br /> <br /> syzbot reported a refcount warning [1] caused by calling get_net() on<br /> a network namespace that is being destroyed (refcount=0). This happens<br /> when a TIPC discovery timer fires during network namespace cleanup.<br /> <br /> The recently added get_net() call in commit e279024617134 ("net/tipc:<br /> fix slab-use-after-free Read in tipc_aead_encrypt_done") attempts to<br /> hold a reference to the network namespace. However, if the namespace<br /> is already being destroyed, its refcount might be zero, leading to the<br /> use-after-free warning.<br /> <br /> Replace get_net() with maybe_get_net(), which safely checks if the<br /> refcount is non-zero before incrementing it. If the namespace is being<br /> destroyed, return -ENODEV early, after releasing the bearer reference.<br /> <br /> [1]: https://lore.kernel.org/all/68342b55.a70a0220.253bc2.0091.GAE@google.com/T/#m12019cf9ae77e1954f666914640efa36d52704a2

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.12.31 (including) 6.12.34 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.14.9 (including) 6.15 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.15.1 (including) 6.15.3 (excluding)
cpe:2.3:o:linux:linux_kernel:5.10.238:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15.185:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1.141:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6.93:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:-:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*