CVE-2025-38416
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/07/2025
Last modified:
23/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
NFC: nci: uart: Set tty->disc_data only in success path<br />
<br />
Setting tty->disc_data before opening the NCI device means we need to<br />
clean it up on error paths. This also opens some short window if device<br />
starts sending data, even before NCIUARTSETDRIVER IOCTL succeeded<br />
(broken hardware?). Close the window by exposing tty->disc_data only on<br />
the success path, when opening of the NCI device and try_module_get()<br />
succeeds.<br />
<br />
The code differs in error path in one aspect: tty->disc_data won&#39;t be<br />
ever assigned thus NULL-ified. This however should not be relevant<br />
difference, because of "tty->disc_data=NULL" in nci_uart_tty_open().
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.2 (including) | 5.4.295 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.239 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.186 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.142 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.95 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.35 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/000bfbc6bc334a93fffca8f5aa9583e7b6356cb5
- https://git.kernel.org/stable/c/55c3dbd8389636161090a2b2b6d2d709b9602e9c
- https://git.kernel.org/stable/c/a514fca2b8e95838a3ba600f31a18fa60b76d893
- https://git.kernel.org/stable/c/a8acc7080ad55c5402a1b818b3008998247dda87
- https://git.kernel.org/stable/c/ac6992f72bd8e22679c1e147ac214de6a7093c23
- https://git.kernel.org/stable/c/dc7722619a9c307e9938d735cf4a2210d3d48dcb
- https://git.kernel.org/stable/c/e9799db771b2d574d5bf0dfb3177485e5f40d4d6
- https://git.kernel.org/stable/c/fc27ab48904ceb7e4792f0c400f1ef175edf16fe
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



