CVE-2025-39673

In the Linux kernel, the following vulnerability has been resolved: ppp: fix race conditions in ppp_fill_forward_path ppp_fill_forward_path() has two race conditions: 1. The ppp->channels list can change between list_empty() and list_first_entry(), as ppp_lock() is not held. If the only channel is deleted in ppp_disconnect_channel(), list_first_entry() may access an empty head or a freed entry, and trigger a panic. 2. pch->chan can be NULL. When ppp_unregister_channel() is called, pch->chan is set to NULL before pch is removed from ppp->channels. Fix these by using a lockless RCU approach: - Use list_first_or_null_rcu() to safely test and access the first list entry. - Convert list modifications on ppp->channels to their RCU variants and add synchronize_net() after removal. - Check for a NULL pch->chan before dereferencing it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Jan 2026, 20:40

Type Values Removed Values Added
CWE CWE-362
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0417adf367a0af11adf7ace849af4638cfb573f7 - () https://git.kernel.org/stable/c/0417adf367a0af11adf7ace849af4638cfb573f7 - Patch
References () https://git.kernel.org/stable/c/0f1630be6fcca3f0c63e4b242ad202e5cde28a40 - () https://git.kernel.org/stable/c/0f1630be6fcca3f0c63e4b242ad202e5cde28a40 - Patch
References () https://git.kernel.org/stable/c/94731cc551e29511d85aa8dec61a6c071b1f2430 - () https://git.kernel.org/stable/c/94731cc551e29511d85aa8dec61a6c071b1f2430 - Patch
References () https://git.kernel.org/stable/c/9a1969fbffc1f1900d92d7594b1b7d8d72ef3dc7 - () https://git.kernel.org/stable/c/9a1969fbffc1f1900d92d7594b1b7d8d72ef3dc7 - Patch
References () https://git.kernel.org/stable/c/ca18d751bcc9faf5b7e82e9fae1223d103928181 - () https://git.kernel.org/stable/c/ca18d751bcc9faf5b7e82e9fae1223d103928181 - Patch
References () https://git.kernel.org/stable/c/f97f6475fdcb3c28ff3c55cc4b7bde632119ec08 - () https://git.kernel.org/stable/c/f97f6475fdcb3c28ff3c55cc4b7bde632119ec08 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

05 Sep 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-05 18:15

Updated : 2026-01-07 20:40


NVD link : CVE-2025-39673

Mitre link : CVE-2025-39673

CVE.ORG link : CVE-2025-39673


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')