CVE-2025-39915
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-12-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.14 (inc) to 6.16.8 (exc) |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a potential deadlock issue in the Linux kernel's network PHY (physical layer) code. It arises from a circular locking dependency between two mutexes: pl->state_mutex and phy->lock. Specifically, different parts of the code acquire these locks in inconsistent orders, which can cause a deadlock if certain functions run concurrently. The problem was detected by the kernel's lock dependency checker (lockdep). The fix involves transferring the locking responsibility for phy_config_inband() to ensure locks are acquired in a consistent order, preventing deadlocks.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to deadlock during network PHY configuration operations. A deadlock means that the system could hang or freeze in the affected code path, potentially causing network functionality to become unresponsive or degraded. However, the practical impact may be limited due to the slow speed of the medium auto-negotiation protocol, which reduces the likelihood of concurrent conflicting lock acquisitions. Still, the risk of serious deadlock exists if certain threads run concurrently.