- Description
- In the Linux kernel, the following vulnerability has been resolved: ipc: fix to protect IPCS lookups using RCU syzbot reported that it discovered a use-after-free vulnerability, [0] [0]: https://lore.kernel.org/all/67af13f8.050a0220.21dd3.0038.GAE@google.com/ idr_for_each() is protected by rwsem, but this is not enough. If it is not protected by RCU read-critical region, when idr_for_each() calls radix_tree_node_free() through call_rcu() to free the radix_tree_node structure, the node will be freed immediately, and when reading the next node in radix_tree_for_each_slot(), the already freed memory may be read. Therefore, we need to add code to make sure that idr_for_each() is protected within the RCU read-critical region when we call it in shm_destroy_orphaned().
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Analyzed
- Products
- linux_kernel, debian_linux
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- nvd@nist.gov
- CWE-416
- Hype score
- Not currently trending
๐จ CRITICAL: #SUSE releases kernel security patch SUSE-SU-2025:03222-1. Fixes 4 CVEs, including CVE-2025-38001 & CVE-2025-38212 (CVSS 8.5). Impacts SLE 15 SP6/SP7 & openSUSE Leap 15.6. Read more:๐ https://t.co/NozG7Yo3tN #Security https://t.co/Fkp5gTQbFk
@Cezar_H_Linux
16 Sept 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
URGENT: Patch #SUSE Linux NOW. Live Patch 24 (SUSE-SU-2025:03194-1) fixes 7 vulnerabilities, including CVE-2025-38212 (CVSS 8.5). Affects SLE 15 SP5, openSUSE Leap 15.5. Risks: Privilege escalation, DoS. Read more:๐ https://t.co/bmF6dWLSFt #Security https://t.co/a6UaQ3a9PE
@Cezar_H_Linux
15 Sept 2025
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐จ CRITICAL ALERT for @SUSELinux & @openSUSE users! Live Patch 17 for SLE 15 SP5/Leap 15.5 patches 9 vulnerabilities, including 2x CVSS 8.5 flaws (CVE-2025-38212, CVE-2025-38001). Read more:๐ https://t.co/YcyQobEZDQ #LinuxSecurity #CyberSecurity #SUSE https://t.co/khI04
@Cezar_H_Linux
14 Sept 2025
41 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
URGENT: Patch #SUSE Linux NOW. Live Patch 17 for SLE 15 SP5 fixes 9 critical kernel vulnerabilities (CVE-2025-38212, CVE-2025-38001, etc.). Risk: Local Privilege Escalation & DoS. Read more:๐ https://t.co/qZMhtWMRT4 https://t.co/f532a39oB0
@Cezar_H_Linux
14 Sept 2025
83 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐จ Critical #Linux kernel update for #SUSE 15 SP5 & #openSUSE Leap 15.5! Patch CVE-2025-21701 (CVSS 7.0) and CVE-2025-38212 (CVSS 8.5) to prevent local privilege escalation and DoS. Read more: ๐ https://t.co/fBfEvRq7yN https://t.co/uN23RVswZG
@Cezar_H_Linux
14 Sept 2025
79 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐จ URGENT #Security Update for @SUSE Linux users! Live Patch 22 for SLE 15 SP5/ #openSUSE Leap 15.5 patches 7 critical kernel vulnerabilities. CVE-2025-38212 (CVSS 8.5) allows privilege escalation. Read more: ๐ https://t.co/I1DlWx37KK https://t.co/wjgmhLEu8J
@Cezar_H_Linux
14 Sept 2025
80 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
๐จ Critical Linux Kernel Patch Alert! ๐จ #SUSE's Live Patch 40 for SLE 15 SP4 fixes 5 important CVEs, including CVE-2025-38212 (CVSS 8.5). Local privilege escalation & DoS risks. Affected products: Leap 15.4, SLES, SAP HANA, HPC, Micro. Read more: ๐ https://t.co/qc7YH
@Cezar_H_Linux
13 Sept 2025
139 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
๐ CRITICAL: #SUSE Linux Kernel Patch Alert! ๐ CVE-2025-38212 (CVSS: 8.5) patched for SLE 15 SP4 & openSUSE Leap 15.4. Fixes a local privilege escalation vulnerability in IPCS. Read more:๐ https://t.co/ndHaZsNDwu #Security https://t.co/iiRuECbyx6
@Cezar_H_Linux
13 Sept 2025
115 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Urgent: #SUSE releases Live Patch 41 for Linux Kernel (SLE 15 SP4/Leap 15.4). Patches 4 vulnerabilities: CVE-2025-37890, CVE-2025-38000, CVE-2025-38001 (CVSS 8.5), CVE-2025-38212 (CVSS 8.5). Read more: ๐ https://t.co/L6VAeHng7B #Security https://t.co/FyoVgvjs8m
@Cezar_H_Linux
13 Sept 2025
113 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
URGENT: #SUSE releases critical Linux kernel security patch for SLE 15 SP4 and #openSUSE Leap 15.4. Fixes 6 vulnerabilities, including: โ CVE-2025-38212 (CVSS 8.5) - IPC UAF โ CVE-2025-38001 (CVSS 8.5) - HFSC flaw Read more:๐ https://t.co/uqFzf8yqz1 https://t.co/
@Cezar_H_Linux
13 Sept 2025
114 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐จ Critical #SUSE Linux Kernel Patch Released! ๐จ Live Patch 29 (SUSE-SU-2025:03175-1) fixes 9 vulnerabilities. CVE-2025-38212 (CVSS 7.8): IPC flaw. Read more: ๐ https://t.co/Tgph25THii #Security https://t.co/ycvdYq3H5t
@Cezar_H_Linux
12 Sept 2025
103 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐จ Critical patch for #SUSE SLE 15 SP4 & #openSUSE Leap 15.4! Live Patch 31 fixes 9 kernel vulnerabilities, including high-severity CVEs: CVE-2025-38212 (CVSS 8.5). CVE-2025-38001 (CVSS 8.5) . Read more:๐ https://t.co/59ducSDAqD #Security https://t.co/NH2uNmjEHK
@Cezar_H_Linux
11 Sept 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
URGENT: Patch your #SUSE Linux 15 SP7 systems now! New kernel vulnerability (CVE-2025-38212) patched. CVSS: 8.5. Allows local privilege escalation. Read more: ๐ https://t.co/pNNqYn2cvt #Security https://t.co/WXJJtPjrW8
@Cezar_H_Linux
10 Sept 2025
62 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
URGENT: #SUSE patches 6 critical Linux Kernel vulnerabilities (SUSE-SU-2025:03109-1). CVSS Scores up to 8.5! Impacts: CVE-2025-38212 (IPC), CVE-2025-38001 (HFSC), and more. Read more: ๐ https://t.co/BnY4fxSrYJ #Security https://t.co/i2uifmu70P
@Cezar_H_Linux
10 Sept 2025
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐จ CRITICAL: #SUSE releases urgent kernel security update for SLE 15 SP6 (Live Patch 0). Patches 11 CVEs, including high-severity flaws: CVE-2025-38087 (UAF in net/sched) and CVE-2025-38212 (IPC flaw). Read more: ๐ https://t.co/fkbU7FavmN #Security https://t.co/75FBOResgR
@Cezar_H_Linux
10 Sept 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
URGENT: #SUSE patches 5 critical CVEs in Linux Kernel RT for SLE 15 SP7. CVE-2025-38212 (CVSS 8.5): IPC flaw CVE-2025-38001 (CVSS 8.5): HFSC flaw Read more: ๐ https://t.co/X16DdiVkST https://t.co/NIxAz9kbmc
@Cezar_H_Linux
10 Sept 2025
60 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
URGENT: Patch #SUSE Linux 15 SP6 now! ๐ CVE-2025-38212 (CVSS: 8.5) allows local privilege escalation in the kernel. Read more: ๐ https://t.co/6V88FlDf45 #Security https://t.co/Boea0HGkKm
@Cezar_H_Linux
9 Sept 2025
44 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐จ Critical patch for #SUSE Linux Enterprise 15 SP6! CVE-2025-38212 (CVSS: 8.5) patches a local privilege escalation flaw in the kernel. Affects Server, SAP, and Real-Time systems. Read more: ๐ https://t.co/0k0Mn5G5aI #Security https://t.co/jNv8FB4WFe
@Cezar_H_Linux
9 Sept 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐ Critical patch for #SUSE SLE 15 SP6 users: Kernel Update 4 fixes 11 vulnerabilities, including high-severity CVEs CVE-2025-38087 and CVE-2025-38212. Prevent use-after-free exploits and privilege escalation. Read more:๐ https://t.co/xq0MY3ZfW9 #Security https://t.co/tRqEO
@Cezar_H_Linux
9 Sept 2025
47 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
URGENT: #SUSE patches 17 Linux kernel vulnerabilities. Multiple CVEs with 8.5 CVSS scores (e.g., CVE-2025-38212) allow local privilege escalation to root. Read more: ๐ https://t.co/OXk9ZdcCeG #Security https://t.co/EFWSQ0tazC
@Cezar_H_Linux
19 Aug 2025
39 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-38212 Use-After-Free Vulnerability in Linux Kernel IPC Subsystem RCU Handling https://t.co/K9VYSmx1Q7
@VulmonFeeds
5 Jul 2025
83 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6DC2C063-D9BB-4ABA-AA0E-AF2032997DE9",
"versionEndExcluding": "5.4.295",
"versionStartIncluding": "3.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3D14F4C-A21E-465D-A928-5CCE684E2B98",
"versionEndExcluding": "5.10.239",
"versionStartIncluding": "5.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D96F2C0D-0D4A-4658-AD34-D8A626EA422D",
"versionEndExcluding": "5.15.186",
"versionStartIncluding": "5.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "459B4E94-FE0E-434D-B782-95E3A5FFC6B1",
"versionEndExcluding": "6.1.142",
"versionStartIncluding": "5.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5E01853-7048-4D78-9479-9AEE41AC8456",
"versionEndExcluding": "6.6.95",
"versionStartIncluding": "6.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E569FD34-0076-4428-BE17-EECCF867611C",
"versionEndExcluding": "6.12.35",
"versionStartIncluding": "6.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DFD174C5-1AA2-4671-BDDC-1A9FCC753655",
"versionEndExcluding": "6.15.4",
"versionStartIncluding": "6.13",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]