-

CVE-2025-39673

In the Linux kernel, the following vulnerability has been resolved:

ppp: fix race conditions in ppp_fill_forward_path

ppp_fill_forward_path() has two race conditions:

1. The ppp->channels list can change between list_empty() and
   list_first_entry(), as ppp_lock() is not held. If the only channel
   is deleted in ppp_disconnect_channel(), list_first_entry() may
   access an empty head or a freed entry, and trigger a panic.

2. pch->chan can be NULL. When ppp_unregister_channel() is called,
   pch->chan is set to NULL before pch is removed from ppp->channels.

Fix these by using a lockless RCU approach:
- Use list_first_or_null_rcu() to safely test and access the first list
  entry.
- Convert list modifications on ppp->channels to their RCU variants and
  add synchronize_net() after removal.
- Check for a NULL pch->chan before dereferencing it.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 9a1969fbffc1f1900d92d7594b1b7d8d72ef3dc7
Version f6efc675c9dd8d93f826b79ae7e33e03301db609
Status affected
Version < 0f1630be6fcca3f0c63e4b242ad202e5cde28a40
Version f6efc675c9dd8d93f826b79ae7e33e03301db609
Status affected
Version < ca18d751bcc9faf5b7e82e9fae1223d103928181
Version f6efc675c9dd8d93f826b79ae7e33e03301db609
Status affected
Version < 94731cc551e29511d85aa8dec61a6c071b1f2430
Version f6efc675c9dd8d93f826b79ae7e33e03301db609
Status affected
Version < f97f6475fdcb3c28ff3c55cc4b7bde632119ec08
Version f6efc675c9dd8d93f826b79ae7e33e03301db609
Status affected
Version < 0417adf367a0af11adf7ace849af4638cfb573f7
Version f6efc675c9dd8d93f826b79ae7e33e03301db609
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.13
Status affected
Version < 5.13
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.149
Status unaffected
Version <= 6.6.*
Version 6.6.103
Status unaffected
Version <= 6.12.*
Version 6.12.44
Status unaffected
Version <= 6.16.*
Version 6.16.4
Status unaffected
Version <= *
Version 6.17-rc3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.092
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string