-
CVE-2025-39673
- EPSS 0.04%
- Published 05.09.2025 17:20:38
- Last modified 08.09.2025 16:25:38
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: ppp: fix race conditions in ppp_fill_forward_path ppp_fill_forward_path() has two race conditions: 1. The ppp->channels list can change between list_empty() and list_first_entry(), as ppp_lock() is not held. If the only channel is deleted in ppp_disconnect_channel(), list_first_entry() may access an empty head or a freed entry, and trigger a panic. 2. pch->chan can be NULL. When ppp_unregister_channel() is called, pch->chan is set to NULL before pch is removed from ppp->channels. Fix these by using a lockless RCU approach: - Use list_first_or_null_rcu() to safely test and access the first list entry. - Convert list modifications on ppp->channels to their RCU variants and add synchronize_net() after removal. - Check for a NULL pch->chan before dereferencing it.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
9a1969fbffc1f1900d92d7594b1b7d8d72ef3dc7
Version
f6efc675c9dd8d93f826b79ae7e33e03301db609
Status
affected
Version <
0f1630be6fcca3f0c63e4b242ad202e5cde28a40
Version
f6efc675c9dd8d93f826b79ae7e33e03301db609
Status
affected
Version <
ca18d751bcc9faf5b7e82e9fae1223d103928181
Version
f6efc675c9dd8d93f826b79ae7e33e03301db609
Status
affected
Version <
94731cc551e29511d85aa8dec61a6c071b1f2430
Version
f6efc675c9dd8d93f826b79ae7e33e03301db609
Status
affected
Version <
f97f6475fdcb3c28ff3c55cc4b7bde632119ec08
Version
f6efc675c9dd8d93f826b79ae7e33e03301db609
Status
affected
Version <
0417adf367a0af11adf7ace849af4638cfb573f7
Version
f6efc675c9dd8d93f826b79ae7e33e03301db609
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.13
Status
affected
Version <
5.13
Version
0
Status
unaffected
Version <=
5.15.*
Version
5.15.190
Status
unaffected
Version <=
6.1.*
Version
6.1.149
Status
unaffected
Version <=
6.6.*
Version
6.6.103
Status
unaffected
Version <=
6.12.*
Version
6.12.44
Status
unaffected
Version <=
6.16.*
Version
6.16.4
Status
unaffected
Version <=
*
Version
6.17-rc3
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.092 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|