
Cloud Vulnerability DB
A community-led vulnerabilities database
A refcount warning vulnerability was discovered in the Linux kernel's TIPC (Transparent Inter-Process Communication) subsystem, identified as CVE-2025-38273. The issue was reported by syzbot and disclosed on July 10, 2025. The vulnerability affects the network namespace handling in the TIPC module, specifically in the tipcaeadencrypt function (NVD, Debian Tracker).
The vulnerability occurs when calling getnet() on a network namespace that is being destroyed (refcount=0). This happens specifically when a TIPC discovery timer fires during network namespace cleanup. The issue stems from a getnet() call added in commit e279024617134 which attempts to hold a reference to the network namespace when it might already be in the process of being destroyed, potentially leading to a use-after-free warning (NVD).
The vulnerability could potentially lead to use-after-free conditions in the Linux kernel's TIPC subsystem, affecting network namespace management. This could impact system stability and potentially lead to kernel crashes (NVD).
The fix involves replacing the getnet() call with maybeget_net(), which safely checks if the refcount is non-zero before incrementing it. If the namespace is being destroyed, the function returns -ENODEV early after releasing the bearer reference (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."