CVE-2025-13350: CWE-416 Use After Free in Canonical Ubuntu Linux
Ubuntu Linux 6.8 GA retains the legacy AF_UNIX garbage collector but backports upstream commit 8594d9b85c07 ("af_unix: Don’t call skb_get() for OOB skb"). When orphaned MSG_OOB sockets hit unix_gc(), the garbage collector still calls kfree_skb() as if OOB SKBs held two references; on Ubuntu Linux 6.8 (Noble Numbat) kernel tree, they have only the queue reference, so the buffer is freed while still reachable and subsequent queue walks dereference freed memory, yielding a reliable local privilege escalation (LPE) caused by a use-after-free (UAF). Ubuntu builds that have already taken the new GC stack from commit 4090fa373f0e, and mainline Linux kernels shipping that infrastructure are unaffected because they no longer execute the legacy collector path. This issue affects Ubuntu Linux from 6.8.0-56.58 before 6.8.0-84.84.
AI Analysis
Technical Summary
CVE-2025-13350 is a use-after-free vulnerability classified under CWE-416 affecting the legacy AF_UNIX garbage collector in Ubuntu Linux 6.8 kernel versions from 6.8.0-56.58 up to but not including 6.8.0-84.84. The vulnerability stems from the garbage collector's handling of orphaned MSG_OOB sockets. Specifically, the garbage collector calls kfree_skb() on socket buffers (SKBs) assuming out-of-band SKBs hold two references, but in these Ubuntu kernel versions, they only have a single queue reference. This discrepancy causes the buffer to be freed while still reachable, leading to subsequent queue traversals dereferencing freed memory. This use-after-free condition can be exploited locally to achieve privilege escalation by manipulating the kernel's memory management of UNIX sockets. The issue does not affect Ubuntu kernels that have integrated the newer garbage collector stack introduced in commit 4090fa373f0e or mainline Linux kernels that have removed the legacy collector path. The vulnerability has a CVSS 4.0 base score of 7.1, indicating high severity, with attack vector local, high attack complexity, no user interaction, and requiring low privileges. Although no known exploits are reported in the wild, the vulnerability presents a reliable attack vector for local attackers to gain elevated privileges.
Potential Impact
The primary impact of CVE-2025-13350 is local privilege escalation on affected Ubuntu Linux systems, allowing an attacker with low-level local access to gain higher privileges, potentially root. This can lead to full system compromise, unauthorized access to sensitive data, and disruption of system integrity and availability. The use-after-free condition could also be leveraged to execute arbitrary code within the kernel context, increasing the risk of persistent and stealthy attacks. Organizations relying on Ubuntu Linux 6.8 kernel versions within the affected range are at risk of internal threats or attackers who have gained limited access through other means. The vulnerability undermines system security controls and could facilitate lateral movement or privilege escalation in multi-user environments, cloud infrastructures, and containerized deployments using these kernels.
Mitigation Recommendations
Organizations should immediately verify if their Ubuntu Linux systems are running kernel versions between 6.8.0-56.58 and 6.8.0-84.84. The primary mitigation is to upgrade to Ubuntu Linux 6.8 kernel versions at or beyond 6.8.0-84.84, which include the fix by removing the legacy garbage collector path and adopting the newer GC stack. If immediate upgrading is not feasible, administrators should restrict local access to trusted users only and monitor for suspicious local activity indicative of exploitation attempts. Employing kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and enabling security modules like SELinux or AppArmor can reduce exploitation likelihood. Regularly auditing and limiting socket usage and privileges can further reduce attack surface. Since no patches are linked in the provided data, organizations should consult Canonical's official security advisories for the latest updates and apply them promptly.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, India, China, Canada, Australia
CVE-2025-13350: CWE-416 Use After Free in Canonical Ubuntu Linux
Description
Ubuntu Linux 6.8 GA retains the legacy AF_UNIX garbage collector but backports upstream commit 8594d9b85c07 ("af_unix: Don’t call skb_get() for OOB skb"). When orphaned MSG_OOB sockets hit unix_gc(), the garbage collector still calls kfree_skb() as if OOB SKBs held two references; on Ubuntu Linux 6.8 (Noble Numbat) kernel tree, they have only the queue reference, so the buffer is freed while still reachable and subsequent queue walks dereference freed memory, yielding a reliable local privilege escalation (LPE) caused by a use-after-free (UAF). Ubuntu builds that have already taken the new GC stack from commit 4090fa373f0e, and mainline Linux kernels shipping that infrastructure are unaffected because they no longer execute the legacy collector path. This issue affects Ubuntu Linux from 6.8.0-56.58 before 6.8.0-84.84.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13350 is a use-after-free vulnerability classified under CWE-416 affecting the legacy AF_UNIX garbage collector in Ubuntu Linux 6.8 kernel versions from 6.8.0-56.58 up to but not including 6.8.0-84.84. The vulnerability stems from the garbage collector's handling of orphaned MSG_OOB sockets. Specifically, the garbage collector calls kfree_skb() on socket buffers (SKBs) assuming out-of-band SKBs hold two references, but in these Ubuntu kernel versions, they only have a single queue reference. This discrepancy causes the buffer to be freed while still reachable, leading to subsequent queue traversals dereferencing freed memory. This use-after-free condition can be exploited locally to achieve privilege escalation by manipulating the kernel's memory management of UNIX sockets. The issue does not affect Ubuntu kernels that have integrated the newer garbage collector stack introduced in commit 4090fa373f0e or mainline Linux kernels that have removed the legacy collector path. The vulnerability has a CVSS 4.0 base score of 7.1, indicating high severity, with attack vector local, high attack complexity, no user interaction, and requiring low privileges. Although no known exploits are reported in the wild, the vulnerability presents a reliable attack vector for local attackers to gain elevated privileges.
Potential Impact
The primary impact of CVE-2025-13350 is local privilege escalation on affected Ubuntu Linux systems, allowing an attacker with low-level local access to gain higher privileges, potentially root. This can lead to full system compromise, unauthorized access to sensitive data, and disruption of system integrity and availability. The use-after-free condition could also be leveraged to execute arbitrary code within the kernel context, increasing the risk of persistent and stealthy attacks. Organizations relying on Ubuntu Linux 6.8 kernel versions within the affected range are at risk of internal threats or attackers who have gained limited access through other means. The vulnerability undermines system security controls and could facilitate lateral movement or privilege escalation in multi-user environments, cloud infrastructures, and containerized deployments using these kernels.
Mitigation Recommendations
Organizations should immediately verify if their Ubuntu Linux systems are running kernel versions between 6.8.0-56.58 and 6.8.0-84.84. The primary mitigation is to upgrade to Ubuntu Linux 6.8 kernel versions at or beyond 6.8.0-84.84, which include the fix by removing the legacy garbage collector path and adopting the newer GC stack. If immediate upgrading is not feasible, administrators should restrict local access to trusted users only and monitor for suspicious local activity indicative of exploitation attempts. Employing kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and enabling security modules like SELinux or AppArmor can reduce exploitation likelihood. Regularly auditing and limiting socket usage and privileges can further reduce attack surface. Since no patches are linked in the provided data, organizations should consult Canonical's official security advisories for the latest updates and apply them promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- canonical
- Date Reserved
- 2025-11-18T09:33:14.643Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a9e2f561e8e69ef5e92419
Added to database: 3/5/2026, 8:09:25 PM
Last enriched: 3/12/2026, 8:36:14 PM
Last updated: 4/20/2026, 3:34:08 AM
Views: 123
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.