CVE-2025-38460
atm: clip: Fix potential null-ptr-deref in to_atmarpd().
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix potential null-ptr-deref in to_atmarpd(). atmarpd is protected by RTNL since commit f3a0592b37b8 ("[ATM]: clip
causes unregister hang"). However, it is not enough because to_atmarpd() is called without RTNL,
especially clip_neigh_solicit() / neigh_ops->solicit() is unsleepable. Also, there is no RTNL dependency around atmarpd. Let's use a private mutex and RCU to protect access to atmarpd in
to_atmarpd().
En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: atm: clip: Se corrige un posible error de referencia nulo en to_atmarpd(). atmarpd está protegido por RTNL desde el commit f3a0592b37b8 ("[ATM]: clip provoca un bloqueo al cancelar el registro"). Sin embargo, esto no es suficiente, ya que to_atmarpd() se llama sin RTNL, especialmente clip_neigh_solicit() / neigh_ops->solicit() no se puede suspender. Además, atmarpd no depende de RTNL. Usemos un mutex privado y una RCU para proteger el acceso a atmarpd en to_atmarpd().
In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix potential null-ptr-deref in to_atmarpd(). atmarpd is protected by RTNL since commit f3a0592b37b8 ("[ATM]: clip causes unregister hang"). However, it is not enough because to_atmarpd() is called without RTNL, especially clip_neigh_solicit() / neigh_ops->solicit() is unsleepable. Also, there is no RTNL dependency around atmarpd. Let's use a private mutex and RCU to protect access to atmarpd in to_atmarpd().
It was discovered that improper initialization of CPU cache memory could allow a local attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2025-04-16 CVE Reserved
- 2025-07-25 CVE Published
- 2025-11-03 CVE Updated
- 2025-11-24 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (9)
| URL | Tag | Source |
|---|---|---|
| https://git.kernel.org/stable/c/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | Vuln. Introduced |
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|
Affected Vendors, Products, and Versions
| Vendor | Product | Version | Other | Status | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.12 < 5.4.296 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.12 < 5.4.296" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.12 < 5.10.240 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.12 < 5.10.240" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.12 < 5.15.189 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.12 < 5.15.189" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.12 < 6.1.146 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.12 < 6.1.146" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.12 < 6.6.99 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.12 < 6.6.99" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.12 < 6.12.39 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.12 < 6.12.39" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.12 < 6.15.7 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.12 < 6.15.7" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.12 < 6.16 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.12 < 6.16" | en |
Affected
| ||||||
