Slab-use-after-free Vulnerability in Linux Kernel's TIPC Module
CVE-2025-38052
What is CVE-2025-38052?
A slab-use-after-free vulnerability has been identified in the TIPC (Transparent Inter-Process Communication) module of the Linux kernel. This issue occurs when the system attempts to access memory that has already been freed, specifically during the encryption completion process in the tipc_aead_encrypt_done function. When a network namespace is deleted, if there are outstanding cryptographic operations relying on the already freed memory, this can result in undefined behavior and potential system instability. The flaw can be exploited under specific conditions, particularly if the simd_aead_encrypt operation is interrupted, causing the cryptd_queue_worker to reference the invalid memory. The vulnerability has been addressed by ensuring the appropriate reference count management for the network namespace before encrypting data.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Linux fc1b6d6de2208774efd2a20bf0daddb02d18b1e0
Linux fc1b6d6de2208774efd2a20bf0daddb02d18b1e0
Linux fc1b6d6de2208774efd2a20bf0daddb02d18b1e0