Bug 2376400 (CVE-2025-38184) - CVE-2025-38184 kernel: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer
Summary: CVE-2025-38184 kernel: tipc: fix null-ptr-deref when acquiring remote ip of e...
Keywords:
Status: NEW
Alias: CVE-2025-38184
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-07-04 14:03 UTC by OSIDB Bzimport
Modified: 2025-07-07 04:00 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-07-04 14:03:58 UTC
In the Linux kernel, the following vulnerability has been resolved:

tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer

The reproduction steps:
1. create a tun interface
2. enable l2 bearer
3. TIPC_NL_UDP_GET_REMOTEIP with media name set to tun

tipc: Started in network mode
tipc: Node identity 8af312d38a21, cluster identity 4711
tipc: Enabled bearer <eth:syz_tun>, priority 1
Oops: general protection fault
KASAN: null-ptr-deref in range
CPU: 1 UID: 1000 PID: 559 Comm: poc Not tainted 6.16.0-rc1+ #117 PREEMPT
Hardware name: QEMU Ubuntu 24.04 PC
RIP: 0010:tipc_udp_nl_dump_remoteip+0x4a4/0x8f0

the ub was in fact a struct dev.

when bid != 0 && skip_cnt != 0, bearer_list[bid] may be NULL or
other media when other thread changes it.

fix this by checking media_id.

Comment 1 Avinash Hanwate 2025-07-07 03:50:56 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025070412-CVE-2025-38184-d45c@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.