-

CVE-2025-39873

In the Linux kernel, the following vulnerability has been resolved:

can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB

can_put_echo_skb() takes ownership of the SKB and it may be freed
during or after the call.

However, xilinx_can xcan_write_frame() keeps using SKB after the call.

Fix that by only calling can_put_echo_skb() after the code is done
touching the SKB.

The tx_lock is held for the entire xcan_write_frame() execution and
also on the can_get_echo_skb() side so the order of operations does not
matter.

An earlier fix commit 3d3c817c3a40 ("can: xilinx_can: Fix usage of skb
memory") did not move the can_put_echo_skb() call far enough.

[mkl: add "commit" in front of sha1 in patch description]
[mkl: fix indention]

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 1139321161a3ba5e45e61e0738b37f42f20bc57a
Version 1598efe57b3e768056e4ca56cb9cf33111e68d1c
Status affected
Version < 94b050726288a56a6b8ff55aa641f2fedbd3b44c
Version 1598efe57b3e768056e4ca56cb9cf33111e68d1c
Status affected
Version < 725b33deebd6e4c96fe7893f384510a54258f28f
Version 1598efe57b3e768056e4ca56cb9cf33111e68d1c
Status affected
Version < 668cc1e3bb21101d074e430de1b7ba8fd10189e7
Version 1598efe57b3e768056e4ca56cb9cf33111e68d1c
Status affected
Version < ef79f00be72bd81d2e1e6f060d83cf7e425deee4
Version 1598efe57b3e768056e4ca56cb9cf33111e68d1c
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 4.19
Status affected
Version < 4.19
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.153
Status unaffected
Version <= 6.6.*
Version 6.6.107
Status unaffected
Version <= 6.12.*
Version 6.12.48
Status unaffected
Version <= 6.16.*
Version 6.16.8
Status unaffected
Version <= *
Version 6.17
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string