CVE-2025-38273

Source
https://cve.org/CVERecord?id=CVE-2025-38273
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38273.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38273
Downstream
Related
Published
2025-07-10T07:41:54.415Z
Modified
2026-03-20T12:42:46.351680Z
Summary
net: tipc: fix refcount warning in tipc_aead_encrypt
Details

In the Linux kernel, the following vulnerability has been resolved:

net: tipc: fix refcount warning in tipcaeadencrypt

syzbot reported a refcount warning [1] caused by calling get_net() on a network namespace that is being destroyed (refcount=0). This happens when a TIPC discovery timer fires during network namespace cleanup.

The recently added getnet() call in commit e279024617134 ("net/tipc: fix slab-use-after-free Read in tipcaeadencryptdone") attempts to hold a reference to the network namespace. However, if the namespace is already being destroyed, its refcount might be zero, leading to the use-after-free warning.

Replace getnet() with maybeget_net(), which safely checks if the refcount is non-zero before incrementing it. If the namespace is being destroyed, return -ENODEV early, after releasing the bearer reference.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38273.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d42ed4de6aba232d946d20653a70f79158a6535b
Fixed
445d59025d76d0638b03110f8791d5b89ed5162d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f5c2c4eaaa5a8e7e0685ec031d480e588e263e59
Fixed
e0b11227c4e8eb4bdf1b86aa8f0f3abb24e0f029
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b8fcae6d2e93c54cacb8f579a77d827c1c643eb5
Fixed
307391e8fe70401a6d39ecc9978e13c2c0cdf81f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b19fc1d0be3c3397e5968fe2627f22e7f84673b1
Fixed
acab7ca5ff19889b80a8ee7dec220ee1a96dede9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
689a205cd968a1572ab561b0c4c2d50a10e9d3b0
Fixed
c762fc79d710d676b793f9d98b1414efe6eb51e6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e279024617134c94fd3e37470156534d5f2b3472
Fixed
9ff60e0d9974dccf24e89bcd3ee7933e538d929f
Fixed
f29ccaa07cf3d35990f4d25028cc55470d29372b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
4a0fddc2c0d5c28aec8c262ad4603be0bef1938c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38273.json"