In the Linux kernel, the following vulnerability has been resolved:
ppp: fix race conditions in ppp_fill_forward_path
ppp_fill_forward_path() has two race conditions:
1. The ppp->channels list can change between list_empty() and
list_first_entry(), as ppp_lock() is not held. If the only channel
is deleted in ppp_disconnect_channel(), list_first_entry() may
access an empty head or a freed entry, and trigger a panic.
2. pch->chan can be NULL. When ppp_unregister_channel() is called,
pch->chan is set to NULL before pch is removed from ppp->channels.
Fix these by using a lockless RCU approach:
- Use list_first_or_null_rcu() to safely test and access the first list
entry.
- Convert list modifications on ppp->channels to their RCU variants and
add synchronize_net() after removal.
- Check for a NULL pch->chan before dereferencing it.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Jan 2026, 20:40
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-362 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/0417adf367a0af11adf7ace849af4638cfb573f7 - Patch | |
| References | () https://git.kernel.org/stable/c/0f1630be6fcca3f0c63e4b242ad202e5cde28a40 - Patch | |
| References | () https://git.kernel.org/stable/c/94731cc551e29511d85aa8dec61a6c071b1f2430 - Patch | |
| References | () https://git.kernel.org/stable/c/9a1969fbffc1f1900d92d7594b1b7d8d72ef3dc7 - Patch | |
| References | () https://git.kernel.org/stable/c/ca18d751bcc9faf5b7e82e9fae1223d103928181 - Patch | |
| References | () https://git.kernel.org/stable/c/f97f6475fdcb3c28ff3c55cc4b7bde632119ec08 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
05 Sep 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-05 18:15
Updated : 2026-01-07 20:40
NVD link : CVE-2025-39673
Mitre link : CVE-2025-39673
CVE.ORG link : CVE-2025-39673
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
