CVE-2025-39764
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/09/2025
Last modified:
18/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: ctnetlink: remove refcounting in expectation dumpers<br />
<br />
Same pattern as previous patch: do not keep the expectation object<br />
alive via refcount, only store a cookie value and then use that<br />
as the skip hint for dump resumption.<br />
<br />
AFAICS this has the same issue as the one resolved in the conntrack<br />
dumper, when we do<br />
if (!refcount_inc_not_zero(&exp->use))<br />
<br />
to increment the refcount, there is a chance that exp == last, which<br />
causes a double-increment of the refcount and subsequent memory leak.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.23 (including) | 6.16.2 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/078d33c95bf534d37aa04269d1ae6158e20082d5
- https://git.kernel.org/stable/c/1492e3dcb2be3aa46d1963da96aa9593e4e4db5a
- https://git.kernel.org/stable/c/64b7684042246e3238464c66894e30ba30c7e851
- https://git.kernel.org/stable/c/9e5021a906532ca16e2aac69c0607711e1c70b1f
- https://git.kernel.org/stable/c/a4d634ded4d3d400f115d84f654f316f249531c9
- https://git.kernel.org/stable/c/b05500444b8eb97644efdd180839a04a706be97c
- https://git.kernel.org/stable/c/bada48ad5b0590e318d0f79636ff62a2ef9f4955



