-

CVE-2025-38212

In the Linux kernel, the following vulnerability has been resolved:

ipc: fix to protect IPCS lookups using RCU

syzbot reported that it discovered a use-after-free vulnerability, [0]

[0]: https://lore.kernel.org/all/67af13f8.050a0220.21dd3.0038.GAE@google.com/

idr_for_each() is protected by rwsem, but this is not enough.  If it is
not protected by RCU read-critical region, when idr_for_each() calls
radix_tree_node_free() through call_rcu() to free the radix_tree_node
structure, the node will be freed immediately, and when reading the next
node in radix_tree_for_each_slot(), the already freed memory may be read.

Therefore, we need to add code to make sure that idr_for_each() is
protected within the RCU read-critical region when we call it in
shm_destroy_orphaned().

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 5f1e1573bf103303944fd7225559de5d8297539c
Version b34a6b1da371ed8af1221459a18c67970f7e3d53
Status affected
Version < b968ba8bfd9f90914957bbbd815413bf6a98eca7
Version b34a6b1da371ed8af1221459a18c67970f7e3d53
Status affected
Version < 74bc813d11c30e28fc5261dc877cca662ccfac68
Version b34a6b1da371ed8af1221459a18c67970f7e3d53
Status affected
Version < 78297d53d3878d43c1d627d20cd09f611fa4b91d
Version b34a6b1da371ed8af1221459a18c67970f7e3d53
Status affected
Version < 5180561afff8e0f029073c8c8117c95c6512d1f9
Version b34a6b1da371ed8af1221459a18c67970f7e3d53
Status affected
Version < 68c173ea138b66d7dd1fd980c9bc578a18e11884
Version b34a6b1da371ed8af1221459a18c67970f7e3d53
Status affected
Version < b0b6bf90ce2699a574b3683e22c44d0dcdd7a057
Version b34a6b1da371ed8af1221459a18c67970f7e3d53
Status affected
Version < d66adabe91803ef34a8b90613c81267b5ded1472
Version b34a6b1da371ed8af1221459a18c67970f7e3d53
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.1
Status affected
Version < 3.1
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.295
Status unaffected
Version <= 5.10.*
Version 5.10.239
Status unaffected
Version <= 5.15.*
Version 5.15.186
Status unaffected
Version <= 6.1.*
Version 6.1.142
Status unaffected
Version <= 6.6.*
Version 6.6.95
Status unaffected
Version <= 6.12.*
Version 6.12.35
Status unaffected
Version <= 6.15.*
Version 6.15.4
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.097
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string