Use-After-Free Vulnerability in TIPC Component of Linux Kernel
CVE-2025-40280
What is CVE-2025-40280?
A use-after-free vulnerability was identified within the TIPC (Transparent Inter-Process Communication) component of the Linux Kernel. This vulnerability occurs due to incorrect handling of the monitor array in the tipc_mon_reinit_self() function, which iterates over the array without proper protection mechanisms. Specifically, while the array is typically safeguarded by RTNL (Read/Write lock for network stack), inadequate synchronization during certain operations could lead to memory access violations. An attacker could exploit this flaw, potentially leading to memory corruption and unauthorized access, thus affecting system stability and security.
Affected Version(s)
Linux 28845c28f842e9e55e75b2c116bff714bb039055 < 5f541300b02ef8b2af34f6f7d41ce617f3571e88
Linux 46cb01eeeb86fca6afe24dda1167b0cb95424e29
Linux 46cb01eeeb86fca6afe24dda1167b0cb95424e29 < 51b8f0ab888f8aa5dfac954918864eeda8c12c19