In the Linux kernel, the following vulnerability has been resolved:
ax25: properly unshare skbs in ax25_kiss_rcv()
Bernard Pidoux reported a regression apparently caused by commit
c353e8983e0d ("net: introduce per netns packet chains").
skb->dev becomes NULL and we crash in __netif_receive_skb_core().
Before above commit, different kind of bugs or corruptions could happen
without a major crash.
But the root cause is that ax25_kiss_rcv() can queue/mangle input skb
without checking if this skb is shared or not.
Many thanks to Bernard Pidoux for his help, diagnosis and tests.
We had a similar issue years ago fixed with commit 7aaed57c5c28
("phonet: properly unshare skbs in phonet_rcv()").
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Jan 2026, 15:19
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | CWE-401 | |
| References | () https://git.kernel.org/stable/c/01a2984cb803f2d487b7074f9718db2bf3531f69 - Patch | |
| References | () https://git.kernel.org/stable/c/2bd0f67212908243ce88e35bf69fa77155b47b14 - Patch | |
| References | () https://git.kernel.org/stable/c/42b46684e2c78ee052d8c2ee8d9c2089233c9094 - Patch | |
| References | () https://git.kernel.org/stable/c/5b079be1b9da49ad88fc304c874d4be7085f7883 - Patch | |
| References | () https://git.kernel.org/stable/c/7d449b7a6c8ee434d10a483feed7c5c50108cf56 - Patch | |
| References | () https://git.kernel.org/stable/c/8156210d36a43e76372312c87eb5ea3dbb405a85 - Patch | |
| References | () https://git.kernel.org/stable/c/89064cf534bea4bb28c83fe6bbb26657b19dd5fe - Patch | |
| References | () https://git.kernel.org/stable/c/b1c71d674a308d2fbc83efcf88bfc4217a86aa17 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List | |
| CPE | cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
19 Sep 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-19 16:15
Updated : 2026-01-20 15:19
NVD link : CVE-2025-39848
Mitre link : CVE-2025-39848
CVE.ORG link : CVE-2025-39848
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime
