CVE-2025-39826
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the 'use' field in the Linux kernel's rose_neigh structure, which is used as a reference counter but was not handled atomically. Because of this, race conditions could occur where the rose_neigh structure is freed while still being referenced elsewhere, leading to potential use-after-free issues. The vulnerability is fixed by converting the 'use' field to an atomic reference counter type (refcount_t) and updating the code to manage references atomically.
How can this vulnerability impact me? :
This vulnerability can cause race conditions that lead to use-after-free errors in the Linux kernel's networking code. Such errors may result in system instability, crashes, or potentially allow attackers to execute arbitrary code or cause denial of service by exploiting the improper memory handling.