CVE-2025-39764
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
11/09/2025
Última modificación:
18/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: ctnetlink: remove refcounting in expectation dumpers<br />
<br />
Same pattern as previous patch: do not keep the expectation object<br />
alive via refcount, only store a cookie value and then use that<br />
as the skip hint for dump resumption.<br />
<br />
AFAICS this has the same issue as the one resolved in the conntrack<br />
dumper, when we do<br />
if (!refcount_inc_not_zero(&exp->use))<br />
<br />
to increment the refcount, there is a chance that exp == last, which<br />
causes a double-increment of the refcount and subsequent memory leak.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.23 (incluyendo) | 6.16.2 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/078d33c95bf534d37aa04269d1ae6158e20082d5
- https://git.kernel.org/stable/c/1492e3dcb2be3aa46d1963da96aa9593e4e4db5a
- https://git.kernel.org/stable/c/64b7684042246e3238464c66894e30ba30c7e851
- https://git.kernel.org/stable/c/9e5021a906532ca16e2aac69c0607711e1c70b1f
- https://git.kernel.org/stable/c/a4d634ded4d3d400f115d84f654f316f249531c9
- https://git.kernel.org/stable/c/b05500444b8eb97644efdd180839a04a706be97c
- https://git.kernel.org/stable/c/bada48ad5b0590e318d0f79636ff62a2ef9f4955



