Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ipc: fix to protect IPCS lookups using RCU syzbot reported that it discovered a use-after-free vulnerability, [0] [0]: https://lore.kernel.org/all/[email protected]/ idr_for_each() is protected by rwsem, but this is not enough. If it is not protected by RCU read-critical region, when idr_for_each() calls radix_tree_node_free() through call_rcu() to free the radix_tree_node structure, the node will be freed immediately, and when reading the next node in radix_tree_for_each_slot(), the already freed memory may be read. Therefore, we need to add code to make sure that idr_for_each() is protected within the RCU read-critical region when we call it in shm_destroy_orphaned().
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.1, < 5.4.295 |
| Debian | Debian Linux | 11.0 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/5180561afff8e0f029073c8c8117c95c6512d1f9Patch
- https://git.kernel.org/stable/c/5f1e1573bf103303944fd7225559de5d8297539cPatch
- https://git.kernel.org/stable/c/68c173ea138b66d7dd1fd980c9bc578a18e11884Patch
- https://git.kernel.org/stable/c/74bc813d11c30e28fc5261dc877cca662ccfac68Patch
- https://git.kernel.org/stable/c/78297d53d3878d43c1d627d20cd09f611fa4b91dPatch
- https://git.kernel.org/stable/c/b0b6bf90ce2699a574b3683e22c44d0dcdd7a057Patch
- https://git.kernel.org/stable/c/b968ba8bfd9f90914957bbbd815413bf6a98eca7Patch
- https://git.kernel.org/stable/c/d66adabe91803ef34a8b90613c81267b5ded1472Patch
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.htmlMailing ListThird Party Advisory
- https://cert-portal.siemens.com/productcert/html/ssa-082556.html
FAQ
What is CVE-2025-38212?
CVE-2025-38212 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: ipc: fix to protect IPCS lookups using RCU syzbot reported that it discovered a use-after-free vulnerability, [0] [0]: https://lo...
How severe is CVE-2025-38212?
CVE-2025-38212 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-38212?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux.