CVE-2025-37749

Updated: 2026-02-08 03:54:00.552771

Description:

In the Linux kernel, the following vulnerability has been resolved: net: ppp: Add bound checking for skb data on ppp_sync_txmung Ensure we have enough data in linear buffer from skb before accessing initial bytes. This prevents potential out-of-bounds accesses when processing short packets. When ppp_sync_txmung receives an incoming package with an empty payload: (remote) gef➤ p *(struct pppoe_hdr *) (skb->head + skb->network_header) $18 = { type = 0x1, ver = 0x1, code = 0x0, sid = 0x2, length = 0x0, tag = 0xffff8880371cdb96 } from the skb struct (trimmed) tail = 0x16, end = 0x140, head = 0xffff88803346f400 "4", data = 0xffff88803346f416 ":\377", truesize = 0x380, len = 0x0, data_len = 0x0, mac_len = 0xe, hdr_len = 0x0, it is not safe to access data[2]. [pabeni@redhat.com: fixed subj typo]


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.1

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

RHEL 7 ELS kernel 3.10.0 7.1 HIGH Needs Triage 2025-11-10 06:21:52
TuxCare 9.6 ESU kernel 5.14.0 7.1 HIGH Already Fixed 2025-12-08 17:55:41
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.1 HIGH In Testing 2025-11-10 08:49:15
Ubuntu 16.04 ELS linux 4.4.0 7.1 HIGH In Testing 2025-11-10 16:15:03
Ubuntu 18.04 ELS linux 4.15.0 7.1 HIGH In Testing 2025-11-10 16:15:04
Ubuntu 20.04 ELS linux 5.4.0 7.1 HIGH In Testing 2025-11-10 16:15:03
Total: 16