CVE-2025-38184
📋 TL;DR
A null pointer dereference vulnerability in the Linux kernel's TIPC (Transparent Inter-Process Communication) subsystem allows local attackers to cause a kernel panic (denial of service) by triggering a race condition when querying remote IP addresses of Ethernet bearers. This affects Linux systems with TIPC enabled, particularly those using network namespaces or virtualization.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially disrupting critical services.
Likely Case
Local denial of service through kernel crash when malicious users trigger the race condition.
If Mitigated
Minimal impact if TIPC is disabled or systems have proper access controls limiting local user privileges.
🎯 Exploit Status
Exploit requires local access and knowledge of TIPC configuration. The provided reproduction steps demonstrate a working proof-of-concept.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patched in kernel commits: 05d332ba075753d569d66333d62d60fff5f57ad8, 0d3d91c3500f0c480e016faa4e2259c588616e59, 0f4a72fb266e48dbe928e1d936eab149e4ac3e1b, 3998283e4c32c0fe69edd59b0876c193f50abce6, 8595350615f952fcf8bc861464a6bf6b1129af50
Vendor Advisory: https://git.kernel.org/stable/c/05d332ba075753d569d66333d62d60fff5f57ad8
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing fixes. 2. Reboot system. 3. Verify kernel version with 'uname -r'.
🔧 Temporary Workarounds
Disable TIPC module
linuxPrevent loading of TIPC kernel module if not required
echo 'install tipc /bin/false' >> /etc/modprobe.d/disable-tipc.conf
rmmod tipc
Restrict local user access
linuxLimit which users can interact with TIPC interfaces
chmod 600 /proc/net/tipc/*
setfacl -m u:root:rwx /proc/net/tipc/
🧯 If You Can't Patch
- Disable TIPC entirely if not needed for system functionality
- Implement strict access controls to prevent unauthorized local users from executing TIPC commands
🔍 How to Verify
Check if Vulnerable:
Check if TIPC is enabled: 'lsmod | grep tipc' and check kernel version against patched versions
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and TIPC module loads without errors in dmesg
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/kern.log or dmesg
- 'general protection fault' errors
- 'KASAN: null-ptr-deref' warnings
Network Indicators:
- Unusual TIPC network traffic patterns
SIEM Query:
source="kernel" AND ("general protection fault" OR "null-ptr-deref" OR "tipc")
🔗 References
- https://git.kernel.org/stable/c/05d332ba075753d569d66333d62d60fff5f57ad8
- https://git.kernel.org/stable/c/0d3d91c3500f0c480e016faa4e2259c588616e59
- https://git.kernel.org/stable/c/0f4a72fb266e48dbe928e1d936eab149e4ac3e1b
- https://git.kernel.org/stable/c/3998283e4c32c0fe69edd59b0876c193f50abce6
- https://git.kernel.org/stable/c/8595350615f952fcf8bc861464a6bf6b1129af50
- https://git.kernel.org/stable/c/c2e17984752b9131061d1a2ca1199da2706337fd
- https://git.kernel.org/stable/c/d3dfe821dfe091c0045044343c8d86596d66e2cf
- https://git.kernel.org/stable/c/f82727adcf2992822e12198792af450a76ebd5ef
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html