vulnerability
Ubuntu: (CVE-2025-39976): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Oct 15, 2025 | Oct 30, 2025 | Nov 4, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved: futex: Use correct exit on failure from futex_hash_allocate_default() copy_process() uses the wrong error exit path from futex_hash_allocate_default(). After exiting from futex_hash_allocate_default(), neither tasklist_lock nor siglock has been acquired. The exit label bad_fork_core_free unlocks both of these locks which is wrong. The next exit label, bad_fork_cancel_cgroup, is the correct exit. sched_cgroup_fork() did not allocate any resources that need to freed. Use bad_fork_cancel_cgroup on error exit from futex_hash_allocate_default().
Solutions
References
- CVE-2025-39976
- https://attackerkb.com/topics/CVE-2025-39976
- URL-https://git.kernel.org/linus/4ec3c15462b9f44562f45723a92e2807746ba7d1
- URL-https://git.kernel.org/stable/c/4ec3c15462b9f44562f45723a92e2807746ba7d1
- URL-https://git.kernel.org/stable/c/f1635765cd0fdbf27b04d9a50be91a01b5adda13
- URL-https://www.cve.org/CVERecord?id=CVE-2025-39976
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.