Home

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI x->id.spi == 0 means "no SPI assigned", but since commit 94f39804d891 ("xfrm: Duplicate SPI Handling"), we now create states and add them to the byspi list with this value. __xfrm_state_delete doesn't remove those states from the byspi list, since they shouldn't be there, and this shows up as a UAF the next time we go through the byspi list.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-13 | Updated 2025-10-13 | Assigner Linux

Product status

Default status
unaffected

3d8090bb53424432fa788fe9a49e8ceca74f0544 before 0baf92d0b1590b903c1f4ead75e61715e50e8146
affected

2fc5b54368a1bf1d2d74b4d3b8eea5309a653e38 before 9fcedabaae0096f712bbb4ccca6a8538af1cd1c8
affected

29e9158f91f99057dbd35db5e8674d93b38549fe before a78e55776522373c446f18d5002a8de4b09e6bf7
affected

94f39804d891cffe4ce17737d295f3b195bc7299 before cd8ae32e4e4652db55bce6b9c79267d8946765a9
affected

c67d4e7a8f90fb6361ca89d4d5c9a28f4e935e47
affected

Default status
unaffected

6.6.103 before 6.6.109
affected

6.12.43 before 6.12.50
affected

6.16.2 before 6.16.10
affected

References

git.kernel.org/...c/0baf92d0b1590b903c1f4ead75e61715e50e8146

git.kernel.org/...c/9fcedabaae0096f712bbb4ccca6a8538af1cd1c8

git.kernel.org/...c/a78e55776522373c446f18d5002a8de4b09e6bf7

git.kernel.org/...c/cd8ae32e4e4652db55bce6b9c79267d8946765a9

cve.org (CVE-2025-39965)

nvd.nist.gov (CVE-2025-39965)

Download JSON