CVE-2025-39848

high

Description

In the Linux kernel, the following vulnerability has been resolved: ax25: properly unshare skbs in ax25_kiss_rcv() Bernard Pidoux reported a regression apparently caused by commit c353e8983e0d ("net: introduce per netns packet chains"). skb->dev becomes NULL and we crash in __netif_receive_skb_core(). Before above commit, different kind of bugs or corruptions could happen without a major crash. But the root cause is that ax25_kiss_rcv() can queue/mangle input skb without checking if this skb is shared or not. Many thanks to Bernard Pidoux for his help, diagnosis and tests. We had a similar issue years ago fixed with commit 7aaed57c5c28 ("phonet: properly unshare skbs in phonet_rcv()").

References

https://git.kernel.org/stable/c/b1c71d674a308d2fbc83efcf88bfc4217a86aa17

https://git.kernel.org/stable/c/89064cf534bea4bb28c83fe6bbb26657b19dd5fe

https://git.kernel.org/stable/c/8156210d36a43e76372312c87eb5ea3dbb405a85

https://git.kernel.org/stable/c/7d449b7a6c8ee434d10a483feed7c5c50108cf56

https://git.kernel.org/stable/c/5b079be1b9da49ad88fc304c874d4be7085f7883

https://git.kernel.org/stable/c/42b46684e2c78ee052d8c2ee8d9c2089233c9094

https://git.kernel.org/stable/c/2bd0f67212908243ce88e35bf69fa77155b47b14

https://git.kernel.org/stable/c/01a2984cb803f2d487b7074f9718db2bf3531f69

Details

Source: Mitre, NVD

Published: 2025-09-19

Updated: 2025-09-22

Risk Information

CVSS v2

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00024