Use-After-Free Vulnerability in Linux Kernel Bridge Multicast Configuration
CVE-2025-38248

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
9 July 2025

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2025-38248?

A use-after-free vulnerability in the Linux kernel's bridge subsystem can be exploited during router port configuration when multicast snooping is enabled. The glitch arises when a multicast router port gets re-added to the global list, despite being removed from it. This leads to memory management issues, including stale entries in both global and per-VLAN router port lists. The flaw could allow attackers to manipulate network traffic or cause system instability when new ports are added, creating a security risk that necessitates prompt attention through updates.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Linux 2796d846d74a18cc6563e96eff8bf28c5e06f912 < 4d3c2a1d4c7c33103f1ddfdbc5cfe1ea4f6d0dcd

Linux 2796d846d74a18cc6563e96eff8bf28c5e06f912

Linux 2796d846d74a18cc6563e96eff8bf28c5e06f912

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.