Acknowledged
Created: Jul 28, 2025
Updated: Jul 29, 2025
Found In Version: 10.22.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 22
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]NFC: nci: uart: Set tty->disc_data only in success path[EOL][EOL]Setting tty->disc_data before opening the NCI device means we need to[EOL]clean it up on error paths. This also opens some short window if device[EOL]starts sending data, even before NCIUARTSETDRIVER IOCTL succeeded[EOL](broken hardware?). Close the window by exposing tty->disc_data only on[EOL]the success path, when opening of the NCI device and try_module_get()[EOL]succeeds.[EOL][EOL]The code differs in error path in one aspect: tty->disc_data won't be[EOL]ever assigned thus NULL-ified. This however should not be relevant[EOL]difference, because of "tty->disc_data=NULL" in nci_uart_tty_open().
CREATE(Triage):(User=admin) [CVE-2025-38416 (https://nvd.nist.gov/vuln/detail/CVE-2025-38416)