CVE-2025-38617
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
22/08/2025
Last modified:
18/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/packet: fix a race in packet_set_ring() and packet_notifier()<br />
<br />
When packet_set_ring() releases po->bind_lock, another thread can<br />
run packet_notifier() and process an NETDEV_UP event.<br />
<br />
This race and the fix are both similar to that of commit 15fe076edea7<br />
("net/packet: fix a race in packet_bind() and packet_notifier()").<br />
<br />
There too the packet_notifier NETDEV_UP event managed to run while a<br />
po->bind_lock critical section had to be temporarily released. And<br />
the fix was similarly to temporarily set po->num to zero to keep<br />
the socket unhooked until the lock is retaken.<br />
<br />
The po->bind_lock in packet_set_ring and packet_notifier precede the<br />
introduction of git history.
Impact
Base Score 3.x
4.70
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.13 (including) | 5.4.297 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.241 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.190 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.148 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.102 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.42 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.16.1 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://blog.calif.io/p/a-race-within-a-race-exploiting-cve
- https://git.kernel.org/stable/c/01d3c8417b9c1b884a8a981a3b886da556512f36
- https://git.kernel.org/stable/c/18f13f2a83eb81be349a9757ba2141ff1da9ad73
- https://git.kernel.org/stable/c/7da733f117533e9b2ebbd530a22ae4028713955c
- https://git.kernel.org/stable/c/7de07705007c7e34995a5599aaab1d23e762d7ca
- https://git.kernel.org/stable/c/88caf46db8239e6471413d28aabaa6b8bd552805
- https://git.kernel.org/stable/c/ba2257034755ae773722f15f4c3ad1dcdad15ca9
- https://git.kernel.org/stable/c/e50ccfaca9e3c671cae917dcb994831a859cf588
- https://git.kernel.org/stable/c/f1791fd7b845bea0ce9674fcf2febee7bc87a893
- https://git.kernel.org/stable/c/f2e8fcfd2b1bc754920108b7f2cd75082c5a18df
- https://github.com/google/security-research/pull/339
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



