CVE-2025-38617

In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_set_ring() releases po->bind_lock, another thread can run packet_notifier() and process an NETDEV_UP event. This race and the fix are both similar to that of commit 15fe076edea7 ("net/packet: fix a race in packet_bind() and packet_notifier()"). There too the packet_notifier NETDEV_UP event managed to run while a po->bind_lock critical section had to be temporarily released. And the fix was similarly to temporarily set po->num to zero to keep the socket unhooked until the lock is retaken. The po->bind_lock in packet_set_ring and packet_notifier precede the introduction of git history.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Jan 2026, 16:57

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/01d3c8417b9c1b884a8a981a3b886da556512f36 - () https://git.kernel.org/stable/c/01d3c8417b9c1b884a8a981a3b886da556512f36 - Patch
References () https://git.kernel.org/stable/c/18f13f2a83eb81be349a9757ba2141ff1da9ad73 - () https://git.kernel.org/stable/c/18f13f2a83eb81be349a9757ba2141ff1da9ad73 - Patch
References () https://git.kernel.org/stable/c/7da733f117533e9b2ebbd530a22ae4028713955c - () https://git.kernel.org/stable/c/7da733f117533e9b2ebbd530a22ae4028713955c - Patch
References () https://git.kernel.org/stable/c/7de07705007c7e34995a5599aaab1d23e762d7ca - () https://git.kernel.org/stable/c/7de07705007c7e34995a5599aaab1d23e762d7ca - Patch
References () https://git.kernel.org/stable/c/88caf46db8239e6471413d28aabaa6b8bd552805 - () https://git.kernel.org/stable/c/88caf46db8239e6471413d28aabaa6b8bd552805 - Patch
References () https://git.kernel.org/stable/c/ba2257034755ae773722f15f4c3ad1dcdad15ca9 - () https://git.kernel.org/stable/c/ba2257034755ae773722f15f4c3ad1dcdad15ca9 - Patch
References () https://git.kernel.org/stable/c/e50ccfaca9e3c671cae917dcb994831a859cf588 - () https://git.kernel.org/stable/c/e50ccfaca9e3c671cae917dcb994831a859cf588 - Patch
References () https://git.kernel.org/stable/c/f1791fd7b845bea0ce9674fcf2febee7bc87a893 - () https://git.kernel.org/stable/c/f1791fd7b845bea0ce9674fcf2febee7bc87a893 - Patch
References () https://git.kernel.org/stable/c/f2e8fcfd2b1bc754920108b7f2cd75082c5a18df - () https://git.kernel.org/stable/c/f2e8fcfd2b1bc754920108b7f2cd75082c5a18df - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CPE cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
CWE CWE-362
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

28 Aug 2025, 15:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/packet: corrección de una carrera en packet_set_ring() y packet_notifier(). Cuando packet_set_ring() libera po->bind_lock, otro hilo puede ejecutar packet_notifier() y procesar un evento NETDEV_UP. Esta carrera y la corrección son similares a las del commit 15fe076edea7 ("net/packet: corrección de una carrera en packet_bind() y packet_notifier()"). En este caso, el evento NETDEV_UP de packet_notifier también se ejecutó mientras una sección crítica de po->bind_lock debía liberarse temporalmente. La corrección también consistía en establecer temporalmente po->num en cero para mantener el socket desconectado hasta que se recupere el bloqueo. El po->bind_lock en packet_set_ring y packet_notifier precede a la introducción del historial de Git.
References
  • () https://git.kernel.org/stable/c/18f13f2a83eb81be349a9757ba2141ff1da9ad73 -
  • () https://git.kernel.org/stable/c/7da733f117533e9b2ebbd530a22ae4028713955c -
  • () https://git.kernel.org/stable/c/ba2257034755ae773722f15f4c3ad1dcdad15ca9 -

22 Aug 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-22 14:15

Updated : 2026-01-07 16:57


NVD link : CVE-2025-38617

Mitre link : CVE-2025-38617

CVE.ORG link : CVE-2025-38617


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')