Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-38542

Опубликовано: 16 авг. 2025
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: net: appletalk: Fix device refcount leak in atrtr_create() When updating an existing route entry in atrtr_create(), the old device reference was not being released before assigning the new device, leading to a device refcount leak. Fix this by calling dev_put() to release the old device reference before holding the new one.

A flaw was found in the Linux kernel's Appletalk protocol implementation. A local user with low privileges could exploit a device reference count (refcount) leak in the atrtr_create() function. This vulnerability, a type of resource management error, prevents the proper release of device resources. The most important consequence is a Denial of Service (DoS), which could lead to system instability or unresponsiveness.

Меры по смягчению последствий

To mitigate this issue on affected Red Hat Enterprise Linux 6 ELS systems, and as a general hardening measure on other systems where Appletalk is not required, prevent the appletalk kernel module from loading. This can be achieved by creating a modprobe configuration file. Create a file named /etc/modprobe.d/disable-appletalk.conf with the following content:

install appletalk /bin/true blacklist appletalk

After creating the file, regenerate the initramfs and reboot the system for the changes to take effect. This may impact functionality if Appletalk services are actively used.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelNot affected
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-911
https://bugzilla.redhat.com/show_bug.cgi?id=2388940kernel: Linux kernel: Denial of Service via device refcount leak in Appletalk protocol implementation

EPSS

Процентиль: 4%
0.00016
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net: appletalk: Fix device refcount leak in atrtr_create() When updating an existing route entry in atrtr_create(), the old device reference was not being released before assigning the new device, leading to a device refcount leak. Fix this by calling dev_put() to release the old device reference before holding the new one.

CVSS3: 5.5
nvd
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net: appletalk: Fix device refcount leak in atrtr_create() When updating an existing route entry in atrtr_create(), the old device reference was not being released before assigning the new device, leading to a device refcount leak. Fix this by calling dev_put() to release the old device reference before holding the new one.

CVSS3: 5.5
msrc
3 месяца назад

net: appletalk: Fix device refcount leak in atrtr_create()

CVSS3: 5.5
debian
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 5.5
github
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net: appletalk: Fix device refcount leak in atrtr_create() When updating an existing route entry in atrtr_create(), the old device reference was not being released before assigning the new device, leading to a device refcount leak. Fix this by calling dev_put() to release the old device reference before holding the new one.

EPSS

Процентиль: 4%
0.00016
Низкий

5.5 Medium

CVSS3

Уязвимость CVE-2025-38542