CVE-2025-38180

In the Linux kernel, the following vulnerability has been resolved: net: atm: fix /proc/net/atm/lec handling /proc/net/atm/lec must ensure safety against dev_lec[] changes. It appears it had dev_put() calls without prior dev_hold(), leading to imbalance and UAF.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

18 Dec 2025, 15:36

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/5fe1b23a2f87f43aeeac51e08819cbc6fd808cbc - () https://git.kernel.org/stable/c/5fe1b23a2f87f43aeeac51e08819cbc6fd808cbc - Patch
References () https://git.kernel.org/stable/c/9b9aeb3ada44d8abea1e31e4446113f460848ae4 - () https://git.kernel.org/stable/c/9b9aeb3ada44d8abea1e31e4446113f460848ae4 - Patch
References () https://git.kernel.org/stable/c/a5e3a144268899f1a8c445c8a3bfa15873ba85e8 - () https://git.kernel.org/stable/c/a5e3a144268899f1a8c445c8a3bfa15873ba85e8 - Patch
References () https://git.kernel.org/stable/c/ca3829c18c8d0ceb656605d3bff6bb3dfb078589 - () https://git.kernel.org/stable/c/ca3829c18c8d0ceb656605d3bff6bb3dfb078589 - Patch
References () https://git.kernel.org/stable/c/d03b79f459c7935cff830d98373474f440bd03ae - () https://git.kernel.org/stable/c/d03b79f459c7935cff830d98373474f440bd03ae - Patch
References () https://git.kernel.org/stable/c/e612c4b014f5808fbc6beae21f5ccaca5e76a2f8 - () https://git.kernel.org/stable/c/e612c4b014f5808fbc6beae21f5ccaca5e76a2f8 - Patch
References () https://git.kernel.org/stable/c/f2d1443b18806640abdb530e88009af7be2588e7 - () https://git.kernel.org/stable/c/f2d1443b18806640abdb530e88009af7be2588e7 - Patch
References () https://git.kernel.org/stable/c/fcfccf56f4eba7d00aa2d33c7bb1b33083237742 - () https://git.kernel.org/stable/c/fcfccf56f4eba7d00aa2d33c7bb1b33083237742 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

08 Jul 2025, 16:18

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: atm: fix /proc/net/atm/lec. El manejo de /proc/net/atm/lec debe garantizar la seguridad contra cambios en dev_lec[]. Al parecer, se invocaban llamadas a dev_put() sin dev_hold() previo, lo que provocaba desequilibrio y UAF.

04 Jul 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-04 14:15

Updated : 2025-12-18 15:36


NVD link : CVE-2025-38180

Mitre link : CVE-2025-38180

CVE.ORG link : CVE-2025-38180


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-416

Use After Free