In the Linux kernel, the following vulnerability has been resolved:
net: txgbe: fix memory leak in txgbe_probe() error path
When txgbe_sw_init() is called, memory is allocated for wx->rss_key
in wx_init_rss_key(). However, in txgbe_probe() function, the subsequent
error paths after txgbe_sw_init() don't free the rss_key. Fix that by
freeing it in error path along with wx->mac_table.
Also change the label to which execution jumps when txgbe_sw_init()
fails, because otherwise, it could lead to a double free for rss_key,
when the mac_table allocation fails in wx_sw_init().
CVSS
No CVSS.
References
Configurations
No configuration.
History
12 May 2025, 17:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 May 2025, 07:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-09 07:16
Updated : 2025-05-12 17:32
NVD link : CVE-2025-37872
Mitre link : CVE-2025-37872
CVE.ORG link : CVE-2025-37872
JSON object : View
Products Affected
No product.
CWE
No CWE.