Bug 2363332 (CVE-2025-37749) - CVE-2025-37749 kernel: net: ppp: Add bound checking for skb data on ppp_sync_txmung
Summary: CVE-2025-37749 kernel: net: ppp: Add bound checking for skb data on ppp_sync_...
Keywords:
Status: NEW
Alias: CVE-2025-37749
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-01 14:04 UTC by OSIDB Bzimport
Modified: 2025-05-19 15:59 UTC (History)
5 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:7903 0 None None None 2025-05-19 03:26:24 UTC

Description OSIDB Bzimport 2025-05-01 14:04:12 UTC
In the Linux kernel, the following vulnerability has been resolved:

net: ppp: Add bound checking for skb data on ppp_sync_txmung

Ensure we have enough data in linear buffer from skb before accessing
initial bytes. This prevents potential out-of-bounds accesses
when processing short packets.

When ppp_sync_txmung receives an incoming package with an empty
payload:
(remote) gef➤  p *(struct pppoe_hdr *) (skb->head + skb->network_header)
$18 = {
	type = 0x1,
	ver = 0x1,
	code = 0x0,
	sid = 0x2,
        length = 0x0,
	tag = 0xffff8880371cdb96
}

from the skb struct (trimmed)
      tail = 0x16,
      end = 0x140,
      head = 0xffff88803346f400 "4",
      data = 0xffff88803346f416 ":\377",
      truesize = 0x380,
      len = 0x0,
      data_len = 0x0,
      mac_len = 0xe,
      hdr_len = 0x0,

it is not safe to access data[2].

[pabeni: fixed subj typo]

Comment 1 Avinash Hanwate 2025-05-02 07:02:16 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025050136-CVE-2025-37749-0f49@gregkh/T

Comment 5 errata-xmlrpc 2025-05-19 03:26:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:7903 https://access.redhat.com/errata/RHSA-2025:7903


Note You need to log in before you can comment on or make changes to this bug.