Vulnerability Details CVE-2025-38273
In the Linux kernel, the following vulnerability has been resolved:
net: tipc: fix refcount warning in tipc_aead_encrypt
syzbot reported a refcount warning [1] caused by calling get_net() on
a network namespace that is being destroyed (refcount=0). This happens
when a TIPC discovery timer fires during network namespace cleanup.
The recently added get_net() call in commit e279024617134 ("net/tipc:
fix slab-use-after-free Read in tipc_aead_encrypt_done") attempts to
hold a reference to the network namespace. However, if the namespace
is already being destroyed, its refcount might be zero, leading to the
use-after-free warning.
Replace get_net() with maybe_get_net(), which safely checks if the
refcount is non-zero before incrementing it. If the namespace is being
destroyed, return -ENODEV early, after releasing the bearer reference.
[1]: https://lore.kernel.org/all/68342b55.a70a0220.253bc2.0091.GAE@google.com/T/#m12019cf9ae77e1954f666914640efa36d52704a2
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 8.9%
CVSS Severity
CVSS v3 Score 5.5
Products affected by CVE-2025-38273
-
cpe:2.3:o:debian:debian_linux:11.0
-
cpe:2.3:o:linux:linux_kernel:5.10.238
-
cpe:2.3:o:linux:linux_kernel:5.15.185
-
cpe:2.3:o:linux:linux_kernel:6.1.141
-
cpe:2.3:o:linux:linux_kernel:6.12.31
-
cpe:2.3:o:linux:linux_kernel:6.12.32
-
cpe:2.3:o:linux:linux_kernel:6.12.33
-
cpe:2.3:o:linux:linux_kernel:6.14.10
-
cpe:2.3:o:linux:linux_kernel:6.14.11
-
cpe:2.3:o:linux:linux_kernel:6.14.9
-
cpe:2.3:o:linux:linux_kernel:6.15
-
cpe:2.3:o:linux:linux_kernel:6.15.1
-
cpe:2.3:o:linux:linux_kernel:6.15.2
-
cpe:2.3:o:linux:linux_kernel:6.6.93