CVE-2025-21751
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
27/02/2025
Last modified:
19/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/mlx5: HWS, change error flow on matcher disconnect<br />
<br />
Currently, when firmware failure occurs during matcher disconnect flow,<br />
the error flow of the function reconnects the matcher back and returns<br />
an error, which continues running the calling function and eventually<br />
frees the matcher that is being disconnected.<br />
This leads to a case where we have a freed matcher on the matchers list,<br />
which in turn leads to use-after-free and eventual crash.<br />
<br />
This patch fixes that by not trying to reconnect the matcher back when<br />
some FW command fails during disconnect.<br />
<br />
Note that we&#39;re dealing here with FW error. We can&#39;t overcome this<br />
problem. This might lead to bad steering state (e.g. wrong connection<br />
between matchers), and will also lead to resource leakage, as it is<br />
the case with any other error handling during resource destruction.<br />
<br />
However, the goal here is to allow the driver to continue and not crash<br />
the machine with use-after-free error.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



