Wind River Support Network

HomeDefectsLIN1024-11106
Acknowledged

LIN1024-11106 : Security Advisory - linux - CVE-2025-39673

Created: Sep 7, 2025    Updated: Sep 8, 2025
Found In Version: 10.24.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 24
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]ppp: fix race conditions in ppp_fill_forward_path[EOL][EOL]ppp_fill_forward_path() has two race conditions:[EOL][EOL]1. The ppp->channels list can change between list_empty() and[EOL]   list_first_entry(), as ppp_lock() is not held. If the only channel[EOL]   is deleted in ppp_disconnect_channel(), list_first_entry() may[EOL]   access an empty head or a freed entry, and trigger a panic.[EOL][EOL]2. pch->chan can be NULL. When ppp_unregister_channel() is called,[EOL]   pch->chan is set to NULL before pch is removed from ppp->channels.[EOL][EOL]Fix these by using a lockless RCU approach:[EOL]- Use list_first_or_null_rcu() to safely test and access the first list[EOL]  entry.[EOL]- Convert list modifications on ppp->channels to their RCU variants and[EOL]  add synchronize_net() after removal.[EOL]- Check for a NULL pch->chan before dereferencing it.

CREATE(Triage):(User=admin) [CVE-2025-39673 (https://nvd.nist.gov/vuln/detail/CVE-2025-39673)
Live chat
Online