CVE-2025-39962

7.8 HIGH

📋 TL;DR

This CVE-2025-39962 is an integer overflow vulnerability in the Linux kernel's rxrpc subsystem that could allow local attackers to cause denial of service or potentially execute arbitrary code. The vulnerability affects systems running vulnerable Linux kernel versions with rxrpc functionality enabled. Attackers need local access to exploit this flaw.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not specified in CVE, but patches available for stable branches
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires rxrpc subsystem to be enabled/compiled into kernel

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to kernel compromise and full system control

🟠

Likely Case

Kernel panic or system crash causing denial of service

🟢

If Mitigated

Limited impact due to local access requirement and potential kernel protections

🌐 Internet-Facing: LOW - Requires local access, not directly exploitable over network
🏢 Internal Only: MEDIUM - Local attackers could crash systems or potentially escalate privileges

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of kernel exploitation techniques

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel trees via provided git commits

Vendor Advisory: https://git.kernel.org/stable/c/2429a197648178cd4dc930a9d87c13c547460564

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version 2. Recompile kernel if using custom build 3. Reboot system to load new kernel

🔧 Temporary Workarounds

Disable rxrpc module

linux

Remove or blacklist rxrpc kernel module if not needed

echo 'blacklist rxrpc' >> /etc/modprobe.d/blacklist.conf
rmmod rxrpc

🧯 If You Can't Patch

  • Restrict local user access to prevent exploitation
  • Implement kernel hardening features like SELinux/AppArmor to limit impact

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if rxrpc module is loaded: lsmod | grep rxrpc

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and check git commit contains fixes

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • System crash dumps
  • Unexpected rxrpc-related errors

Network Indicators:

  • None - local exploit only

SIEM Query:

Search for kernel panic events or unexpected system reboots

🔗 References

📤 Share & Export