We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-37749

net: ppp: Add bound checking for skb data on ppp_sync_txmung



Description

In the Linux kernel, the following vulnerability has been resolved: net: ppp: Add bound checking for skb data on ppp_sync_txmung Ensure we have enough data in linear buffer from skb before accessing initial bytes. This prevents potential out-of-bounds accesses when processing short packets. When ppp_sync_txmung receives an incoming package with an empty payload: (remote) gef➤ p *(struct pppoe_hdr *) (skb->head + skb->network_header) $18 = { type = 0x1, ver = 0x1, code = 0x0, sid = 0x2, length = 0x0, tag = 0xffff8880371cdb96 } from the skb struct (trimmed) tail = 0x16, end = 0x140, head = 0xffff88803346f400 "4", data = 0xffff88803346f416 ":\377", truesize = 0x380, len = 0x0, data_len = 0x0, mac_len = 0xe, hdr_len = 0x0, it is not safe to access data[2]. [pabeni@redhat.com: fixed subj typo]

Reserved 2025-04-16 | Published 2025-05-01 | Updated 2025-05-26 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 529401c8f12ecc35f9ea5d946d5a5596cf172b48
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before de5a4f0cba58625e88b7bebd88f780c8c0150997
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 99aa698dec342a07125d733e39aab4394b3b7e05
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before b78f2b458f56a5a4d976c8e01c43dbf58d3ea2ca
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before fbaffe8bccf148ece8ad67eb5d7aa852cabf59c8
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before b4c836d33ca888695b2f2665f948bc1b34fbd533
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 1f6eb9fa87a781d5370c0de7794ae242f1a95ee5
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 6e8a6bf43cea4347121ab21bb1ed8d7bef7e732e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before aabc6596ffb377c4c9c8f335124b92ea282c9821
affected

Default status
affected

2.6.12
affected

Any version before 2.6.12
unaffected

5.4.293
unaffected

5.10.237
unaffected

5.15.181
unaffected

6.1.135
unaffected

6.6.88
unaffected

6.12.24
unaffected

6.13.12
unaffected

6.14.3
unaffected

6.15
unaffected

References

git.kernel.org/...c/529401c8f12ecc35f9ea5d946d5a5596cf172b48

git.kernel.org/...c/de5a4f0cba58625e88b7bebd88f780c8c0150997

git.kernel.org/...c/99aa698dec342a07125d733e39aab4394b3b7e05

git.kernel.org/...c/b78f2b458f56a5a4d976c8e01c43dbf58d3ea2ca

git.kernel.org/...c/fbaffe8bccf148ece8ad67eb5d7aa852cabf59c8

git.kernel.org/...c/b4c836d33ca888695b2f2665f948bc1b34fbd533

git.kernel.org/...c/1f6eb9fa87a781d5370c0de7794ae242f1a95ee5

git.kernel.org/...c/6e8a6bf43cea4347121ab21bb1ed8d7bef7e732e

git.kernel.org/...c/aabc6596ffb377c4c9c8f335124b92ea282c9821

cve.org (CVE-2025-37749)

nvd.nist.gov (CVE-2025-37749)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-37749

Support options

Helpdesk Chat, Email, Knowledgebase