Wind River Support Network

HomeDefectsLIN1023-14593
Acknowledged

LIN1023-14593 : Security Advisory - linux - CVE-2025-38666

Created: Aug 24, 2025    Updated: Aug 26, 2025
Found In Version: 10.23.30.1
Severity: Standard
Applicable for: Wind River Linux LTS 23
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]net: appletalk: Fix use-after-free in AARP proxy probe[EOL][EOL]The AARP proxyâ\x80\x90probe routine (aarp_proxy_probe_network) sends a probe,[EOL]releases the aarp_lock, sleeps, then re-acquires the lock.  During that[EOL]window an expire timer thread (__aarp_expire_timer) can remove and[EOL]kfree() the same entry, leading to a use-after-free.[EOL][EOL]race condition:[EOL][EOL]         cpu 0                           (            cpu 1[EOL)    atalk_sendmsg()                     |   atif_proxy_probe_device()EOL]    aarp_send_ddp()                      (   aarp_proxy_probe_network()[EOL)    mod_timer()                         |   lock(aarp_lock) // LOCK!!EOL]    timeout around 200ms                 (   alloc(aarp_entry)[EOL)    and then call                       |   proxieshash] = aarp_entry[EOL]    aarp_expire_timeout()                (   aarp_send_probe()[EOL)                                        |   unlock(aarp_lock) // UNLOCK!!EOL]    lock(aarp_lock) // LOCK!!            (   msleep(100);[EOL)    __aarp_expire_timer(&proxiesct])    ([EOL)    free(aarp_entry)                    |EOL]    unlock(aarp_lock) // UNLOCK!!        ([EOL)                                        |   lock(aarp_lock) // LOCK!!EOL]                                         (   UAF aarp_entry !![EOL)EOL]==================================================================[EOL]BUG: KASAN: slab-use-after-free in aarp_proxy_probe_network+0x560/0x630 net/appletalk/aarp.c:493[EOL]Read of size 4 at addr ffff8880123aa360 by task repro/13278[EOL][EOL]CPU: 3 UID: 0 PID: 13278 Comm: repro Not tainted 6.15.2 #3 PREEMPT(full)[EOL]Call Trace:[EOL] <TASK>[EOL] __dump_stack lib/dump_stack.c:94 [inline][EOL] dump_stack_lvl+0x116/0x1b0 lib/dump_stack.c:120[EOL] print_address_description mm/kasan/report.c:408 [inline][EOL] print_report+0xc1/0x630 mm/kasan/report.c:521[EOL] kasan_report+0xca/0x100 mm/kasan/report.c:634[EOL] aarp_proxy_probe_network+0x560/0x630 net/appletalk/aarp.c:493[EOL] atif_proxy_probe_device net/appletalk/ddp.c:332 [inline][EOL] atif_ioctl+0xb58/0x16c0 net/appletalk/ddp.c:857[EOL] atalk_ioctl+0x198/0x2f0 net/appletalk/ddp.c:1818[EOL] sock_do_ioctl+0xdc/0x260 net/socket.c:1190[EOL] sock_ioctl+0x239/0x6a0 net/socket.c:1311[EOL] vfs_ioctl fs/ioctl.c:51 [inline][EOL] __do_sys_ioctl fs/ioctl.c:906 [inline][EOL] __se_sys_ioctl fs/ioctl.c:892 [inline][EOL] __x64_sys_ioctl+0x194/0x200 fs/ioctl.c:892[EOL] do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline][EOL] do_syscall_64+0xcb/0x250 arch/x86/entry/syscall_64.c:94[EOL] entry_SYSCALL_64_after_hwframe+0x77/0x7f[EOL] </TASK>[EOL][EOL]Allocated:[EOL] aarp_alloc net/appletalk/aarp.c:382 [inline][EOL] aarp_proxy_probe_network+0xd8/0x630 net/appletalk/aarp.c:468[EOL] atif_proxy_probe_device net/appletalk/ddp.c:332 [inline][EOL] atif_ioctl+0xb58/0x16c0 net/appletalk/ddp.c:857[EOL] atalk_ioctl+0x198/0x2f0 net/appletalk/ddp.c:1818[EOL][EOL]Freed:[EOL] kfree+0x148/0x4d0 mm/slub.c:4841[EOL] __aarp_expire net/appletalk/aarp.c:90 [inline][EOL] __aarp_expire_timer net/appletalk/aarp.c:261 [inline][EOL] aarp_expire_timeout+0x480/0x6e0 net/appletalk/aarp.c:317[EOL][EOL]The buggy address belongs to the object at ffff8880123aa300[EOL] which belongs to the cache kmalloc-192 of size 192[EOL]The buggy address is located 96 bytes inside of[EOL] freed 192-byte region [ffff8880123aa300, ffff8880123aa3c0)[EOL][EOL]Memory state around the buggy address:[EOL] ffff8880123aa200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[EOL] ffff8880123aa280: 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc[EOL]>ffff8880123aa300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb[EOL]                                                       ^[EOL] ffff8880123aa380: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc[EOL] ffff8880123aa400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[EOL]==================================================================

CREATE(Triage):(User=pbi-cn) [CVE-2025-38666 (https://nvd.nist.gov/vuln/detail/CVE-2025-38666)
Live chat
Online