CVE-2025-38323
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's ATM networking code, specifically in the lecd_attach() function in net/atm/lec.c. It occurs because an error path can leave a dangling pointer in the dev_lec[] array. The issue arises from missing synchronization, which was fixed by adding a mutex to protect accesses to dev_lecp[] in lecd_attach(), lec_vcc_attach(), and lec_mcast_attach(). This prevents the kernel from accessing freed memory, which could lead to crashes or other unpredictable behavior.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to access freed memory, leading to potential system crashes, instability, or undefined behavior. In some cases, such use-after-free bugs can be exploited to execute arbitrary code or escalate privileges, although the exact impact depends on the attacker's capabilities and system configuration.