{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-38184","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:23.992Z","datePublished":"2025-07-04T13:37:11.226Z","dateUpdated":"2026-05-11T21:22:52.348Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:22:52.348Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer\n\nThe reproduction steps:\n1. create a tun interface\n2. enable l2 bearer\n3. TIPC_NL_UDP_GET_REMOTEIP with media name set to tun\n\ntipc: Started in network mode\ntipc: Node identity 8af312d38a21, cluster identity 4711\ntipc: Enabled bearer <eth:syz_tun>, priority 1\nOops: general protection fault\nKASAN: null-ptr-deref in range\nCPU: 1 UID: 1000 PID: 559 Comm: poc Not tainted 6.16.0-rc1+ #117 PREEMPT\nHardware name: QEMU Ubuntu 24.04 PC\nRIP: 0010:tipc_udp_nl_dump_remoteip+0x4a4/0x8f0\n\nthe ub was in fact a struct dev.\n\nwhen bid != 0 && skip_cnt != 0, bearer_list[bid] may be NULL or\nother media when other thread changes it.\n\nfix this by checking media_id."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/tipc/udp_media.c"],"versions":[{"version":"832629ca5c313e122b22b8e73a6d80f111b1a1ae","lessThan":"3998283e4c32c0fe69edd59b0876c193f50abce6","status":"affected","versionType":"git"},{"version":"832629ca5c313e122b22b8e73a6d80f111b1a1ae","lessThan":"c2e17984752b9131061d1a2ca1199da2706337fd","status":"affected","versionType":"git"},{"version":"832629ca5c313e122b22b8e73a6d80f111b1a1ae","lessThan":"8595350615f952fcf8bc861464a6bf6b1129af50","status":"affected","versionType":"git"},{"version":"832629ca5c313e122b22b8e73a6d80f111b1a1ae","lessThan":"05d332ba075753d569d66333d62d60fff5f57ad8","status":"affected","versionType":"git"},{"version":"832629ca5c313e122b22b8e73a6d80f111b1a1ae","lessThan":"d3dfe821dfe091c0045044343c8d86596d66e2cf","status":"affected","versionType":"git"},{"version":"832629ca5c313e122b22b8e73a6d80f111b1a1ae","lessThan":"0d3d91c3500f0c480e016faa4e2259c588616e59","status":"affected","versionType":"git"},{"version":"832629ca5c313e122b22b8e73a6d80f111b1a1ae","lessThan":"0f4a72fb266e48dbe928e1d936eab149e4ac3e1b","status":"affected","versionType":"git"},{"version":"832629ca5c313e122b22b8e73a6d80f111b1a1ae","lessThan":"f82727adcf2992822e12198792af450a76ebd5ef","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/tipc/udp_media.c"],"versions":[{"version":"4.9","status":"affected"},{"version":"0","lessThan":"4.9","status":"unaffected","versionType":"semver"},{"version":"5.4.295","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.239","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.186","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.142","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.95","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.35","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.15.4","lessThanOrEqual":"6.15.*","status":"unaffected","versionType":"semver"},{"version":"6.16","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"5.4.295"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"5.10.239"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"5.15.186"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"6.1.142"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"6.6.95"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"6.12.35"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"6.15.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"6.16"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/3998283e4c32c0fe69edd59b0876c193f50abce6"},{"url":"https://git.kernel.org/stable/c/c2e17984752b9131061d1a2ca1199da2706337fd"},{"url":"https://git.kernel.org/stable/c/8595350615f952fcf8bc861464a6bf6b1129af50"},{"url":"https://git.kernel.org/stable/c/05d332ba075753d569d66333d62d60fff5f57ad8"},{"url":"https://git.kernel.org/stable/c/d3dfe821dfe091c0045044343c8d86596d66e2cf"},{"url":"https://git.kernel.org/stable/c/0d3d91c3500f0c480e016faa4e2259c588616e59"},{"url":"https://git.kernel.org/stable/c/0f4a72fb266e48dbe928e1d936eab149e4ac3e1b"},{"url":"https://git.kernel.org/stable/c/f82727adcf2992822e12198792af450a76ebd5ef"}],"title":"tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T17:35:09.900Z"}}]}}