CVE-2025-39827
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a slab-use-after-free issue in the Linux kernel's rose network protocol implementation. It arises because two separate reference counting mechanisms for rose_neigh structures were not properly synchronized, leading to premature freeing of these structures while they were still in use. The patch merges these reference counts to ensure rose_neigh objects are only freed when all references, including those from rose_node structures, are released, preventing use-after-free errors.
How can this vulnerability impact me? :
The vulnerability can cause use-after-free errors in the Linux kernel's rose network protocol, potentially leading to system instability, crashes, or security issues such as memory corruption. This could affect the reliability and security of systems using the affected kernel component.