In the Linux kernel, the following vulnerability has been resolved:
NFC: nci: uart: Set tty->disc_data only in success path
Setting tty->disc_data before opening the NCI device means we need to
clean it up on error paths. This also opens some short window if device
starts sending data, even before NCIUARTSETDRIVER IOCTL succeeded
(broken hardware?). Close the window by exposing tty->disc_data only on
the success path, when opening of the NCI device and try_module_get()
succeeds.
The code differs in error path in one aspect: tty->disc_data won't be
ever assigned thus NULL-ified. This however should not be relevant
difference, because of "tty->disc_data=NULL" in nci_uart_tty_open().
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
23 Dec 2025, 18:45
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/000bfbc6bc334a93fffca8f5aa9583e7b6356cb5 - Patch | |
| References | () https://git.kernel.org/stable/c/55c3dbd8389636161090a2b2b6d2d709b9602e9c - Patch | |
| References | () https://git.kernel.org/stable/c/a514fca2b8e95838a3ba600f31a18fa60b76d893 - Patch | |
| References | () https://git.kernel.org/stable/c/a8acc7080ad55c5402a1b818b3008998247dda87 - Patch | |
| References | () https://git.kernel.org/stable/c/ac6992f72bd8e22679c1e147ac214de6a7093c23 - Patch | |
| References | () https://git.kernel.org/stable/c/dc7722619a9c307e9938d735cf4a2210d3d48dcb - Patch | |
| References | () https://git.kernel.org/stable/c/e9799db771b2d574d5bf0dfb3177485e5f40d4d6 - Patch | |
| References | () https://git.kernel.org/stable/c/fc27ab48904ceb7e4792f0c400f1ef175edf16fe - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List | |
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | NVD-CWE-noinfo |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
25 Jul 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-25 14:15
Updated : 2025-12-23 18:45
NVD link : CVE-2025-38416
Mitre link : CVE-2025-38416
CVE.ORG link : CVE-2025-38416
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
