CVE-2025-39673
BaseFortify
Publication date: 2025-09-05
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves race conditions in the Linux kernel's ppp_fill_forward_path() function. Specifically, the ppp->channels list can change between checks without proper locking, which may cause the system to access invalid or freed memory, potentially leading to a kernel panic. Additionally, a channel pointer (pch->chan) can be NULL when accessed, causing further issues. The fix involves using lockless RCU (Read-Copy-Update) techniques to safely access and modify the list and checking for NULL pointers before dereferencing.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to panic due to race conditions when handling PPP channels, potentially leading to system crashes or denial of service. This can affect system stability and availability, especially on systems relying on PPP connections.