CVE-2025-39768

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/09/2025
Last modified:
15/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/mlx5: HWS, fix complex rules rehash error flow<br /> <br /> Moving rules from matcher to matcher should not fail.<br /> However, if it does fail due to various reasons, the error flow<br /> should allow the kernel to continue functioning (albeit with broken<br /> steering rules) instead of going into series of soft lock-ups or<br /> some other problematic behaviour.<br /> <br /> Similar to the simple rules, complex rules rehash logic suffers<br /> from the same problems. This patch fixes the error flow for moving<br /> complex rules:<br /> - If new rule creation fails before it was even enqeued, do not<br /> poll for completion<br /> - If TIMEOUT happened while moving the rule, no point trying<br /> to poll for completions for other rules. Something is broken,<br /> completion won&amp;#39;t come, just abort the rehash sequence.<br /> - If some other completion with error received, don&amp;#39;t give up.<br /> Continue handling rest of the rules to minimize the damage.<br /> - Make sure that the first error code that was received will<br /> be actually returned to the caller instead of replacing it<br /> with the generic error code.<br /> <br /> All the aforementioned issues stem from the same bad error flow,<br /> so no point fixing them one by one and leaving partially broken<br /> code - fixing them in one patch.

Impact