CVE-2025-39905
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-12-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 6.16.8 (exc) |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-362 | The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a race condition in the Linux kernel's phylink component where concurrent writes to pl->phydev are not properly serialized. The existing locking mechanism (pl->state_mutex) is in a lock inversion state with pl->phydev->lock, causing potential race conditions when dereferencing pl->phydev without holding pl->state_mutex. The fix adds an extra lock to properly serialize these concurrent writes and avoid race conditions, preventing deadlocks and ensuring safer access to shared resources.
How can this vulnerability impact me? :
This vulnerability can lead to race conditions and potential deadlocks in the Linux kernel's network subsystem, which may cause system instability, crashes, or unpredictable behavior in network device management. Such issues could affect the reliability and availability of systems running affected Linux kernel versions.