-
CVE-2025-38273
- EPSS 0.04%
- Published 10.07.2025 07:41:54
- Last modified 10.07.2025 13:17:30
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: net: tipc: fix refcount warning in tipc_aead_encrypt syzbot reported a refcount warning [1] caused by calling get_net() on a network namespace that is being destroyed (refcount=0). This happens when a TIPC discovery timer fires during network namespace cleanup. The recently added get_net() call in commit e279024617134 ("net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done") attempts to hold a reference to the network namespace. However, if the namespace is already being destroyed, its refcount might be zero, leading to the use-after-free warning. Replace get_net() with maybe_get_net(), which safely checks if the refcount is non-zero before incrementing it. If the namespace is being destroyed, return -ENODEV early, after releasing the bearer reference. [1]: https://lore.kernel.org/all/68342b55.a70a0220.253bc2.0091.GAE@google.com/T/#m12019cf9ae77e1954f666914640efa36d52704a2
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
445d59025d76d0638b03110f8791d5b89ed5162d
Version
d42ed4de6aba232d946d20653a70f79158a6535b
Status
affected
Version <
e0b11227c4e8eb4bdf1b86aa8f0f3abb24e0f029
Version
f5c2c4eaaa5a8e7e0685ec031d480e588e263e59
Status
affected
Version <
307391e8fe70401a6d39ecc9978e13c2c0cdf81f
Version
b8fcae6d2e93c54cacb8f579a77d827c1c643eb5
Status
affected
Version <
acab7ca5ff19889b80a8ee7dec220ee1a96dede9
Version
b19fc1d0be3c3397e5968fe2627f22e7f84673b1
Status
affected
Version <
c762fc79d710d676b793f9d98b1414efe6eb51e6
Version
689a205cd968a1572ab561b0c4c2d50a10e9d3b0
Status
affected
Version <
9ff60e0d9974dccf24e89bcd3ee7933e538d929f
Version
e279024617134c94fd3e37470156534d5f2b3472
Status
affected
Version <
f29ccaa07cf3d35990f4d25028cc55470d29372b
Version
e279024617134c94fd3e37470156534d5f2b3472
Status
affected
Version
4a0fddc2c0d5c28aec8c262ad4603be0bef1938c
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.15
Status
affected
Version <
6.15
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.239
Status
unaffected
Version <=
5.15.*
Version
5.15.186
Status
unaffected
Version <=
6.1.*
Version
6.1.142
Status
unaffected
Version <=
6.6.*
Version
6.6.94
Status
unaffected
Version <=
6.12.*
Version
6.12.34
Status
unaffected
Version <=
6.15.*
Version
6.15.3
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.098 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|