Home

Description

In the Linux kernel, the following vulnerability has been resolved: net: airoha: fix potential use-after-free in airoha_npu_get() np->name was being used after calling of_node_put(np), which releases the node and can lead to a use-after-free bug. Previously, of_node_put(np) was called unconditionally after of_find_device_by_node(np), which could result in a use-after-free if pdev is NULL. This patch moves of_node_put(np) after the error check to ensure the node is only released after both the error and success cases are handled appropriately, preventing potential resource issues.

PUBLISHED Reserved 2025-04-16 | Published 2025-08-16 | Updated 2025-08-16 | Assigner Linux

Product status

Default status
unaffected

23290c7bc190def4e1ca61610992d9b7c32e33f3 before df6bf96b41e547e350667bc4c143be53646d070d
affected

23290c7bc190def4e1ca61610992d9b7c32e33f3 before 3cd582e7d0787506990ef0180405eb6224fa90a6
affected

Default status
affected

6.15
affected

Any version before 6.15
unaffected

6.15.8
unaffected

6.16
unaffected

References

git.kernel.org/...c/df6bf96b41e547e350667bc4c143be53646d070d

git.kernel.org/...c/3cd582e7d0787506990ef0180405eb6224fa90a6

cve.org (CVE-2025-38536)

nvd.nist.gov (CVE-2025-38536)

Download JSON