CVE-2025-39827

Source
https://cve.org/CVERecord?id=CVE-2025-39827
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39827.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39827
Downstream
Related
Published
2025-09-16T13:00:25.555Z
Modified
2026-03-20T12:43:03.994748Z
Summary
net: rose: include node references in rose_neigh refcount
Details

In the Linux kernel, the following vulnerability has been resolved:

net: rose: include node references in rose_neigh refcount

Current implementation maintains two separate reference counting mechanisms: the 'count' field in struct roseneigh tracks references from rosenode structures, while the 'use' field (now refcountt) tracks references from rosesock.

This patch merges these two reference counting systems using 'use' field for proper reference management. Specifically, this patch adds incrementing and decrementing of roseneigh->use when roseneigh->count is incremented or decremented.

This patch also modifies rosertfree(), rosertdevicedown() and roseclearroute() to properly release references to roseneigh objects before freeing a rosenode through roseremove_node().

These changes ensure roseneigh structures are properly freed only when all references, including those from rosenode structures, are released. As a result, this resolves a slab-use-after-free issue reported by Syzbot.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39827.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
4cce478c3e82a5fc788d72adb2f4c4e983997639
Fixed
9c547c8eee9d1cf6e744611d688b9f725cf9a115
Fixed
d7563b456ed44151e1a82091d96f60166daea89b
Fixed
384210cceb1873a4c8218b27ba0745444436b728
Fixed
da9c9c877597170b929a6121a68dcd3dd9a80f45

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39827.json"