-

CVE-2025-39847

In the Linux kernel, the following vulnerability has been resolved:

ppp: fix memory leak in pad_compress_skb

If alloc_skb() fails in pad_compress_skb(), it returns NULL without
releasing the old skb. The caller does:

    skb = pad_compress_skb(ppp, skb);
    if (!skb)
        goto drop;

drop:
    kfree_skb(skb);

When pad_compress_skb() returns NULL, the reference to the old skb is
lost and kfree_skb(skb) ends up doing nothing, leading to a memory leak.

Align pad_compress_skb() semantics with realloc(): only free the old
skb if allocation and compression succeed.  At the call site, use the
new_skb variable so the original skb is not lost when pad_compress_skb()
fails.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 9ca6a040f76c0b149293e430dabab446f3fc8ab7
Version b3f9b92a6ec1a9a5e4b4b36e484f2f62cc73277c
Status affected
Version < 87a35a36742df328d0badf4fbc2e56061c15846c
Version b3f9b92a6ec1a9a5e4b4b36e484f2f62cc73277c
Status affected
Version < 0b21e9cd4559102da798bdcba453b64ecd7be7ee
Version b3f9b92a6ec1a9a5e4b4b36e484f2f62cc73277c
Status affected
Version < 1d8b354eafb8876d8bdb1bef69c7d2438aacfbe8
Version b3f9b92a6ec1a9a5e4b4b36e484f2f62cc73277c
Status affected
Version < 85c1c86a67e09143aa464e9bf09c397816772348
Version b3f9b92a6ec1a9a5e4b4b36e484f2f62cc73277c
Status affected
Version < 631fc8ab5beb9e0ec8651fb9875b9a968e7b4ae4
Version b3f9b92a6ec1a9a5e4b4b36e484f2f62cc73277c
Status affected
Version < 33a5bac5f14772730d2caf632ae97b6c2ee95044
Version b3f9b92a6ec1a9a5e4b4b36e484f2f62cc73277c
Status affected
Version < 4844123fe0b853a4982c02666cb3fd863d701d50
Version b3f9b92a6ec1a9a5e4b4b36e484f2f62cc73277c
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.15
Status affected
Version < 2.6.15
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.299
Status unaffected
Version <= 5.10.*
Version 5.10.243
Status unaffected
Version <= 5.15.*
Version 5.15.192
Status unaffected
Version <= 6.1.*
Version 6.1.151
Status unaffected
Version <= 6.6.*
Version 6.6.105
Status unaffected
Version <= 6.12.*
Version 6.12.46
Status unaffected
Version <= 6.16.*
Version 6.16.6
Status unaffected
Version <= *
Version 6.17-rc5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.079
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string