Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13350: CWE-416 Use After Free in Canonical Ubuntu Linux

0
High
VulnerabilityCVE-2025-13350cvecve-2025-13350cwe-416
Published: Thu Mar 05 2026 (03/05/2026, 18:56:03 UTC)
Source: CVE Database V5
Vendor/Project: Canonical
Product: Ubuntu Linux

Description

Ubuntu Linux 6.8 GA retains the legacy AF_UNIX garbage collector but backports upstream commit 8594d9b85c07 ("af_unix: Don’t call skb_get() for OOB skb"). When orphaned MSG_OOB sockets hit unix_gc(), the garbage collector still calls kfree_skb() as if OOB SKBs held two references; on Ubuntu Linux 6.8 (Noble Numbat) kernel tree, they have only the queue reference, so the buffer is freed while still reachable and subsequent queue walks dereference freed memory, yielding a reliable local privilege escalation (LPE) caused by a use-after-free (UAF). Ubuntu builds that have already taken the new GC stack from commit 4090fa373f0e, and mainline Linux kernels shipping that infrastructure are unaffected because they no longer execute the legacy collector path. This issue affects Ubuntu Linux from 6.8.0-56.58 before 6.8.0-84.84.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/12/2026, 20:36:14 UTC

Technical Analysis

CVE-2025-13350 is a use-after-free vulnerability classified under CWE-416 affecting the legacy AF_UNIX garbage collector in Ubuntu Linux 6.8 kernel versions from 6.8.0-56.58 up to but not including 6.8.0-84.84. The vulnerability stems from the garbage collector's handling of orphaned MSG_OOB sockets. Specifically, the garbage collector calls kfree_skb() on socket buffers (SKBs) assuming out-of-band SKBs hold two references, but in these Ubuntu kernel versions, they only have a single queue reference. This discrepancy causes the buffer to be freed while still reachable, leading to subsequent queue traversals dereferencing freed memory. This use-after-free condition can be exploited locally to achieve privilege escalation by manipulating the kernel's memory management of UNIX sockets. The issue does not affect Ubuntu kernels that have integrated the newer garbage collector stack introduced in commit 4090fa373f0e or mainline Linux kernels that have removed the legacy collector path. The vulnerability has a CVSS 4.0 base score of 7.1, indicating high severity, with attack vector local, high attack complexity, no user interaction, and requiring low privileges. Although no known exploits are reported in the wild, the vulnerability presents a reliable attack vector for local attackers to gain elevated privileges.

Potential Impact

The primary impact of CVE-2025-13350 is local privilege escalation on affected Ubuntu Linux systems, allowing an attacker with low-level local access to gain higher privileges, potentially root. This can lead to full system compromise, unauthorized access to sensitive data, and disruption of system integrity and availability. The use-after-free condition could also be leveraged to execute arbitrary code within the kernel context, increasing the risk of persistent and stealthy attacks. Organizations relying on Ubuntu Linux 6.8 kernel versions within the affected range are at risk of internal threats or attackers who have gained limited access through other means. The vulnerability undermines system security controls and could facilitate lateral movement or privilege escalation in multi-user environments, cloud infrastructures, and containerized deployments using these kernels.

Mitigation Recommendations

Organizations should immediately verify if their Ubuntu Linux systems are running kernel versions between 6.8.0-56.58 and 6.8.0-84.84. The primary mitigation is to upgrade to Ubuntu Linux 6.8 kernel versions at or beyond 6.8.0-84.84, which include the fix by removing the legacy garbage collector path and adopting the newer GC stack. If immediate upgrading is not feasible, administrators should restrict local access to trusted users only and monitor for suspicious local activity indicative of exploitation attempts. Employing kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and enabling security modules like SELinux or AppArmor can reduce exploitation likelihood. Regularly auditing and limiting socket usage and privileges can further reduce attack surface. Since no patches are linked in the provided data, organizations should consult Canonical's official security advisories for the latest updates and apply them promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
canonical
Date Reserved
2025-11-18T09:33:14.643Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a9e2f561e8e69ef5e92419

Added to database: 3/5/2026, 8:09:25 PM

Last enriched: 3/12/2026, 8:36:14 PM

Last updated: 4/20/2026, 3:34:08 AM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses