-

CVE-2025-38377

In the Linux kernel, the following vulnerability has been resolved:

rose: fix dangling neighbour pointers in rose_rt_device_down()

There are two bugs in rose_rt_device_down() that can cause
use-after-free:

1. The loop bound `t->count` is modified within the loop, which can
   cause the loop to terminate early and miss some entries.

2. When removing an entry from the neighbour array, the subsequent entries
   are moved up to fill the gap, but the loop index `i` is still
   incremented, causing the next entry to be skipped.

For example, if a node has three neighbours (A, A, B) with count=3 and A
is being removed, the second A is not checked.

    i=0: (A, A, B) -> (A, B) with count=2
          ^ checked
    i=1: (A, B)    -> (A, B) with count=2
             ^ checked (B, not A!)
    i=2: (doesn't occur because i < count is false)

This leaves the second A in the array with count=2, but the rose_neigh
structure has been freed. Code that accesses these entries assumes that
the first `count` entries are valid pointers, causing a use-after-free
when it accesses the dangling pointer.

Fix both issues by iterating over the array in reverse order with a fixed
loop bound. This ensures that all entries are examined and that the removal
of an entry doesn't affect subsequent iterations.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 94e0918e39039c47ddceb609500817f7266be756
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < fe62a35fb1f77f494ed534fc69a9043dc5a30ce1
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2b952dbb32fef835756f07ff0cd77efbb836dfea
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < b6b232e16e08c6dc120672b4753392df0d28c1b4
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 7a1841c9609377e989ec41c16551309ce79c39e4
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 446ac00b86be1670838e513b643933d78837d8db
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2c6c82ee074bfcfd1bc978ec45bfea37703d840a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 34a500caf48c47d5171f4aa1f237da39b07c6157
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.12
Status affected
Version < 2.6.12
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.296
Status unaffected
Version <= 5.10.*
Version 5.10.240
Status unaffected
Version <= 5.15.*
Version 5.15.187
Status unaffected
Version <= 6.1.*
Version 6.1.144
Status unaffected
Version <= 6.6.*
Version 6.6.97
Status unaffected
Version <= 6.12.*
Version 6.12.37
Status unaffected
Version <= 6.15.*
Version 6.15.6
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.103
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string