In the Linux kernel, the following vulnerability has been resolved:
net/packet: fix a race in packet_set_ring() and packet_notifier()
When packet_set_ring() releases po->bind_lock, another thread can
run packet_notifier() and process an NETDEV_UP event.
This race and the fix are both similar to that of commit 15fe076edea7
("net/packet: fix a race in packet_bind() and packet_notifier()").
There too the packet_notifier NETDEV_UP event managed to run while a
po->bind_lock critical section had to be temporarily released. And
the fix was similarly to temporarily set po->num to zero to keep
the socket unhooked until the lock is retaken.
The po->bind_lock in packet_set_ring and packet_notifier precede the
introduction of git history.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Jan 2026, 16:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/01d3c8417b9c1b884a8a981a3b886da556512f36 - Patch | |
| References | () https://git.kernel.org/stable/c/18f13f2a83eb81be349a9757ba2141ff1da9ad73 - Patch | |
| References | () https://git.kernel.org/stable/c/7da733f117533e9b2ebbd530a22ae4028713955c - Patch | |
| References | () https://git.kernel.org/stable/c/7de07705007c7e34995a5599aaab1d23e762d7ca - Patch | |
| References | () https://git.kernel.org/stable/c/88caf46db8239e6471413d28aabaa6b8bd552805 - Patch | |
| References | () https://git.kernel.org/stable/c/ba2257034755ae773722f15f4c3ad1dcdad15ca9 - Patch | |
| References | () https://git.kernel.org/stable/c/e50ccfaca9e3c671cae917dcb994831a859cf588 - Patch | |
| References | () https://git.kernel.org/stable/c/f1791fd7b845bea0ce9674fcf2febee7bc87a893 - Patch | |
| References | () https://git.kernel.org/stable/c/f2e8fcfd2b1bc754920108b7f2cd75082c5a18df - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory | |
| CPE | cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* |
|
| CWE | CWE-362 | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
28 Aug 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
22 Aug 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-22 14:15
Updated : 2026-01-07 16:57
NVD link : CVE-2025-38617
Mitre link : CVE-2025-38617
CVE.ORG link : CVE-2025-38617
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
