CVE-2025-37872

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/05/2025
Last modified:
12/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: txgbe: fix memory leak in txgbe_probe() error path<br /> <br /> When txgbe_sw_init() is called, memory is allocated for wx-&gt;rss_key<br /> in wx_init_rss_key(). However, in txgbe_probe() function, the subsequent<br /> error paths after txgbe_sw_init() don&amp;#39;t free the rss_key. Fix that by<br /> freeing it in error path along with wx-&gt;mac_table.<br /> <br /> Also change the label to which execution jumps when txgbe_sw_init()<br /> fails, because otherwise, it could lead to a double free for rss_key,<br /> when the mac_table allocation fails in wx_sw_init().

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.12.25 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.14.4 (excluding)
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*