-

CVE-2025-71182

In the Linux kernel, the following vulnerability has been resolved:

can: j1939: make j1939_session_activate() fail if device is no longer registered

syzbot is still reporting

  unregister_netdevice: waiting for vcan0 to become free. Usage count = 2

even after commit 93a27b5891b8 ("can: j1939: add missing calls in
NETDEV_UNREGISTER notification handler") was added. A debug printk() patch
found that j1939_session_activate() can succeed even after
j1939_cancel_active_session() from j1939_netdev_notify(NETDEV_UNREGISTER)
has completed.

Since j1939_cancel_active_session() is processed with the session list lock
held, checking ndev->reg_state in j1939_session_activate() with the session
list lock held can reliably close the race window.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < ebb0dfd718dd31c8d3600612ca4b7207ec3d923a
Version 9d71dd0c70099914fcd063135da3c580865e924c
Status affected
Version < c3a4316e3c746af415c0fd6c6d489ad13f53714d
Version 9d71dd0c70099914fcd063135da3c580865e924c
Status affected
Version < 46ca9dc978923c5e1247a9e9519240ba7ace413c
Version 9d71dd0c70099914fcd063135da3c580865e924c
Status affected
Version < 78d87b72cebe2a993fd5b017e9f14fb6278f2eae
Version 9d71dd0c70099914fcd063135da3c580865e924c
Status affected
Version < ba6f0d1832eeb5eb3a6dc5cb30e0f720b3cb3536
Version 9d71dd0c70099914fcd063135da3c580865e924c
Status affected
Version < 79dd3f1d9dd310c2af89b09c71f34d93973b200f
Version 9d71dd0c70099914fcd063135da3c580865e924c
Status affected
Version < 5d5602236f5db19e8b337a2cd87a90ace5ea776d
Version 9d71dd0c70099914fcd063135da3c580865e924c
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.4
Status affected
Version < 5.4
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.248
Status unaffected
Version <= 5.15.*
Version 5.15.198
Status unaffected
Version <= 6.1.*
Version 6.1.161
Status unaffected
Version <= 6.6.*
Version 6.6.121
Status unaffected
Version <= 6.12.*
Version 6.12.66
Status unaffected
Version <= 6.18.*
Version 6.18.6
Status unaffected
Version <= *
Version 6.19-rc2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.059
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.