{"id":"CVE-2025-38416","summary":"NFC: nci: uart: Set tty-\u003edisc_data only in success path","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: nci: uart: Set tty-\u003edisc_data only in success path\n\nSetting tty-\u003edisc_data before opening the NCI device means we need to\nclean it up on error paths.  This also opens some short window if device\nstarts sending data, even before NCIUARTSETDRIVER IOCTL succeeded\n(broken hardware?).  Close the window by exposing tty-\u003edisc_data only on\nthe success path, when opening of the NCI device and try_module_get()\nsucceeds.\n\nThe code differs in error path in one aspect: tty-\u003edisc_data won't be\never assigned thus NULL-ified.  This however should not be relevant\ndifference, because of \"tty-\u003edisc_data=NULL\" in nci_uart_tty_open().","modified":"2026-04-15T23:59:26.500403889Z","published":"2025-07-25T14:00:17.849Z","related":["SUSE-SU-2025:02853-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:02969-1","SUSE-SU-2025:02996-1","SUSE-SU-2025:02997-1","SUSE-SU-2025:03011-1","SUSE-SU-2025:03023-1","SUSE-SU-2025:20577-1","SUSE-SU-2025:20586-1","SUSE-SU-2025:20601-1","SUSE-SU-2025:20602-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","openSUSE-SU-2025:20081-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38416.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/000bfbc6bc334a93fffca8f5aa9583e7b6356cb5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/55c3dbd8389636161090a2b2b6d2d709b9602e9c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a514fca2b8e95838a3ba600f31a18fa60b76d893"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a8acc7080ad55c5402a1b818b3008998247dda87"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ac6992f72bd8e22679c1e147ac214de6a7093c23"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dc7722619a9c307e9938d735cf4a2210d3d48dcb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e9799db771b2d574d5bf0dfb3177485e5f40d4d6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fc27ab48904ceb7e4792f0c400f1ef175edf16fe"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38416.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38416"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"9961127d4bce6325e9a0b0fb105e0c85a6c62cb7"},{"fixed":"a514fca2b8e95838a3ba600f31a18fa60b76d893"},{"fixed":"000bfbc6bc334a93fffca8f5aa9583e7b6356cb5"},{"fixed":"ac6992f72bd8e22679c1e147ac214de6a7093c23"},{"fixed":"dc7722619a9c307e9938d735cf4a2210d3d48dcb"},{"fixed":"a8acc7080ad55c5402a1b818b3008998247dda87"},{"fixed":"55c3dbd8389636161090a2b2b6d2d709b9602e9c"},{"fixed":"e9799db771b2d574d5bf0dfb3177485e5f40d4d6"},{"fixed":"fc27ab48904ceb7e4792f0c400f1ef175edf16fe"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38416.json"}}],"schema_version":"1.7.5"}