CVE-2025-39826
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
16/09/2025
Last modified:
16/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: rose: convert &#39;use&#39; field to refcount_t<br />
<br />
The &#39;use&#39; field in struct rose_neigh is used as a reference counter but<br />
lacks atomicity. This can lead to race conditions where a rose_neigh<br />
structure is freed while still being referenced by other code paths.<br />
<br />
For example, when rose_neigh->use becomes zero during an ioctl operation<br />
via rose_rt_ioctl(), the structure may be removed while its timer is<br />
still active, potentially causing use-after-free issues.<br />
<br />
This patch changes the type of &#39;use&#39; from unsigned short to refcount_t and<br />
updates all code paths to use rose_neigh_hold() and rose_neigh_put() which<br />
operate reference counts atomically.
Impact
Base Score 3.x
7.00
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.12.1 (including) | 6.1.150 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.104 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.45 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.16.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0085b250fcc79f900c82a69980ec2f3e1871823b
- https://git.kernel.org/stable/c/203e4f42596ede31498744018716a3db6dbb7f51
- https://git.kernel.org/stable/c/d860d1faa6b2ce3becfdb8b0c2b048ad31800061
- https://git.kernel.org/stable/c/f8c29fc437d03a98fb075c31c5be761cc8326284
- https://git.kernel.org/stable/c/fb07156cc0742ba4e93dfcc84280c011d05b301f
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



