CVE-2025-39976 — Improper Check or Handling of Exceptional Conditions in Linux
Severity
4.5MEDIUM
No vectorEPSS
0.0%
top 92.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 15
Description
In the Linux kernel, the following vulnerability has been resolved:
futex: Use correct exit on failure from futex_hash_allocate_default()
copy_process() uses the wrong error exit path from futex_hash_allocate_default().
After exiting from futex_hash_allocate_default(), neither tasklist_lock
nor siglock has been acquired. The exit label bad_fork_core_free unlocks
both of these locks which is wrong.
The next exit label, bad_fork_cancel_cgroup, is the correct exit.
sched_cgroup_fork() did not al…
Affected Packages5 packages
▶CVEListV5linux/linux7c4f75a21f636486d2969d9b6680403ea8483539 — f1635765cd0fdbf27b04d9a50be91a01b5adda13+2
🔴Vulnerability Details
3GHSA▶
GHSA-rgc5-qvp4-69x6: In the Linux kernel, the following vulnerability has been resolved:
futex: Use correct exit on failure from futex_hash_allocate_default()
copy_proce↗2025-10-15
OSV▶
CVE-2025-39976: In the Linux kernel, the following vulnerability has been resolved: futex: Use correct exit on failure from futex_hash_allocate_default() copy_process↗2025-10-15