CVE-2025-39925
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-12-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.4 (inc) to 6.16.8 (exc) |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's j1939 protocol occurs because it lacked a NETDEV_UNREGISTER notification handler to undo changes made by the j1939_sk_bind() function. Without this handler, an extra reference held by j1939_sk_bind() is not released when a network device is unregistered, causing the usage count of the device to remain too high. This prevents the unregister_netdevice() function from completing properly, potentially leading to resource leaks or device unregistration failures.
How can this vulnerability impact me? :
The vulnerability can cause the network device (specifically related to the j1939 protocol) to remain in use longer than intended because its usage count does not drop correctly. This can lead to failures in unregistering network devices, which may result in resource leaks, system instability, or unexpected behavior in network communications involving the j1939 protocol.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for the error message 'unregister_netdevice: waiting for vcan0 to become free. Usage count = 2' in kernel logs, which indicates the issue with the j1939 protocol's NETDEV_UNREGISTER notification handler. You can check kernel logs using commands like 'dmesg | grep unregister_netdevice' or 'journalctl -k | grep unregister_netdevice' to identify this problem.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix implementing the NETDEV_UNREGISTER notification handler for the j1939 protocol, which properly handles the release of references and prevents the usage count from being stuck. Until the update is applied, monitoring for the error and avoiding operations that trigger unregister_netdevice on j1939 interfaces may help reduce impact.