lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025052058-CVE-2025-37909-f6da@gregkh>
Date: Tue, 20 May 2025 17:22:06 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-37909: net: lan743x: Fix memleak issue when GSO enabled

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

net: lan743x: Fix memleak issue when GSO enabled

Always map the `skb` to the LS descriptor. Previously skb was
mapped to EXT descriptor when the number of fragments is zero with
GSO enabled. Mapping the skb to EXT descriptor prevents it from
being freed, leading to a memory leak

The Linux kernel CVE team has assigned CVE-2025-37909 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 4.17 with commit 23f0703c125be490f70501b6b24ed5645775c56a and fixed in 5.15.182 with commit df993daa4c968b4b23078eacc248f6502ede8664
	Issue introduced in 4.17 with commit 23f0703c125be490f70501b6b24ed5645775c56a and fixed in 6.1.138 with commit a0e0efbabbbe6a1859bc31bf65237ce91e124b9b
	Issue introduced in 4.17 with commit 23f0703c125be490f70501b6b24ed5645775c56a and fixed in 6.6.90 with commit dae1ce27ceaea7e1522025b15252e3cc52802622
	Issue introduced in 4.17 with commit 23f0703c125be490f70501b6b24ed5645775c56a and fixed in 6.12.28 with commit 189b05f189cac9fd233ef04d31cb5078c4d09c39
	Issue introduced in 4.17 with commit 23f0703c125be490f70501b6b24ed5645775c56a and fixed in 6.14.6 with commit f42c18e2f14c1b1fdd2a5250069a84bc854c398c
	Issue introduced in 4.17 with commit 23f0703c125be490f70501b6b24ed5645775c56a and fixed in 6.15-rc5 with commit 2d52e2e38b85c8b7bc00dca55c2499f46f8c8198

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2025-37909
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/net/ethernet/microchip/lan743x_main.c
	drivers/net/ethernet/microchip/lan743x_main.h


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/df993daa4c968b4b23078eacc248f6502ede8664
	https://git.kernel.org/stable/c/a0e0efbabbbe6a1859bc31bf65237ce91e124b9b
	https://git.kernel.org/stable/c/dae1ce27ceaea7e1522025b15252e3cc52802622
	https://git.kernel.org/stable/c/189b05f189cac9fd233ef04d31cb5078c4d09c39
	https://git.kernel.org/stable/c/f42c18e2f14c1b1fdd2a5250069a84bc854c398c
	https://git.kernel.org/stable/c/2d52e2e38b85c8b7bc00dca55c2499f46f8c8198

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ