In the Linux kernel, the following vulnerability has been resolved:
netfilter: ctnetlink: remove refcounting in expectation dumpers
Same pattern as previous patch: do not keep the expectation object
alive via refcount, only store a cookie value and then use that
as the skip hint for dump resumption.
AFAICS this has the same issue as the one resolved in the conntrack
dumper, when we do
if (!refcount_inc_not_zero(&exp->use))
to increment the refcount, there is a chance that exp == last, which
causes a double-increment of the refcount and subsequent memory leak.
References
Configurations
Configuration 1 (hide)
|
History
25 Nov 2025, 19:58
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | NVD-CWE-Other | |
| References | () https://git.kernel.org/stable/c/1492e3dcb2be3aa46d1963da96aa9593e4e4db5a - Patch | |
| References | () https://git.kernel.org/stable/c/a4d634ded4d3d400f115d84f654f316f249531c9 - Patch | |
| First Time |
Linux
Linux linux Kernel |
11 Sep 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-11 17:15
Updated : 2025-11-25 19:58
NVD link : CVE-2025-39764
Mitre link : CVE-2025-39764
CVE.ORG link : CVE-2025-39764
JSON object : View
Products Affected
linux
- linux_kernel
CWE
