Home

Description

In the Linux kernel, the following vulnerability has been resolved: can: j1939: implement NETDEV_UNREGISTER notification handler syzbot is reporting unregister_netdevice: waiting for vcan0 to become free. Usage count = 2 problem, for j1939 protocol did not have NETDEV_UNREGISTER notification handler for undoing changes made by j1939_sk_bind(). Commit 25fe97cb7620 ("can: j1939: move j1939_priv_put() into sk_destruct callback") expects that a call to j1939_priv_put() can be unconditionally delayed until j1939_sk_sock_destruct() is called. But we need to call j1939_priv_put() against an extra ref held by j1939_sk_bind() call (as a part of undoing changes made by j1939_sk_bind()) as soon as NETDEV_UNREGISTER notification fires (i.e. before j1939_sk_sock_destruct() is called via j1939_sk_release()). Otherwise, the extra ref on "struct j1939_priv" held by j1939_sk_bind() call prevents "struct net_device" from dropping the usage count to 1; making it impossible for unregister_netdevice() to continue. [mkl: remove space in front of label]

PUBLISHED Reserved 2025-04-16 | Published 2025-10-01 | Updated 2025-10-01 | Assigner Linux

Product status

Default status
unaffected

9d71dd0c70099914fcd063135da3c580865e924c before da9e8f429139928570407e8f90559b5d46c20262
affected

9d71dd0c70099914fcd063135da3c580865e924c before 7fcbe5b2c6a4b5407bf2241fdb71e0a390f6ab9a
affected

Default status
affected

5.4
affected

Any version before 5.4
unaffected

6.16.8
unaffected

6.17
unaffected

References

git.kernel.org/...c/da9e8f429139928570407e8f90559b5d46c20262

git.kernel.org/...c/7fcbe5b2c6a4b5407bf2241fdb71e0a390f6ab9a

cve.org (CVE-2025-39925)

nvd.nist.gov (CVE-2025-39925)

Download JSON