CVE-2025-39703
BaseFortify
Publication date: 2025-09-05
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.15.0 |
| linux | linux_kernel | 5.10.244 |
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the handling of HSR (High-availability Seamless Redundancy) frames. When the kernel receives an HSR frame that does not have enough space in the socket buffer (skb) to hold the HSR tag, it causes a kernel crash (kernel BUG). Specifically, the skb_push() function panics because there is insufficient headroom in the skb to add the HSR tag. This happens when a corrupted HSR frame with an incomplete tag is processed, leading to a crash in the network bridge code. The issue was fixed by dropping frames that are too short to contain both Ethernet and HSR headers, preventing the crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when it processes corrupted HSR frames with insufficient space for the HSR tag. Such a crash results in a kernel panic, leading to a denial of service (DoS) condition where the affected system becomes unstable or unresponsive until rebooted. This can disrupt network operations and affect system availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for kernel panic messages related to skb_under_panic or kernel BUG in net/core/skbuff.c. Specifically, look for messages indicating a crash caused by receiving HSR frames with insufficient space to hold the HSR tag in the skb. Commands such as 'dmesg | grep skb_under_panic' or 'journalctl -k | grep skb_under_panic' can help identify these kernel panic logs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where this vulnerability is fixed. The fix involves dropping and consuming frames that are not long enough to contain both ethernet and HSR headers, preventing the kernel panic. Until the update is applied, monitoring and filtering corrupted HSR frames on the network or disabling HSR functionality if not needed can reduce exposure.