{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-37872","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:23.959Z","datePublished":"2025-05-09T06:44:00.570Z","dateUpdated":"2026-05-11T21:16:44.502Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:16:44.502Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: txgbe: fix memory leak in txgbe_probe() error path\n\nWhen txgbe_sw_init() is called, memory is allocated for wx->rss_key\nin wx_init_rss_key(). However, in txgbe_probe() function, the subsequent\nerror paths after txgbe_sw_init() don't free the rss_key. Fix that by\nfreeing it in error path along with wx->mac_table.\n\nAlso change the label to which execution jumps when txgbe_sw_init()\nfails, because otherwise, it could lead to a double free for rss_key,\nwhen the mac_table allocation fails in wx_sw_init()."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/wangxun/txgbe/txgbe_main.c"],"versions":[{"version":"937d46ecc5f941b26270bdf7ce37495f12b25955","lessThan":"635863d93deb8e352d63a8eba852efeaf1ac3539","status":"affected","versionType":"git"},{"version":"937d46ecc5f941b26270bdf7ce37495f12b25955","lessThan":"837197a722919f5b0eeb967fe7cb0cc1e83173b9","status":"affected","versionType":"git"},{"version":"937d46ecc5f941b26270bdf7ce37495f12b25955","lessThan":"b2727326d0a53709380aa147018085d71a6d4843","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/wangxun/txgbe/txgbe_main.c"],"versions":[{"version":"6.8","status":"affected"},{"version":"0","lessThan":"6.8","status":"unaffected","versionType":"semver"},{"version":"6.12.25","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.14.4","lessThanOrEqual":"6.14.*","status":"unaffected","versionType":"semver"},{"version":"6.15","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8","versionEndExcluding":"6.12.25"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8","versionEndExcluding":"6.14.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8","versionEndExcluding":"6.15"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/635863d93deb8e352d63a8eba852efeaf1ac3539"},{"url":"https://git.kernel.org/stable/c/837197a722919f5b0eeb967fe7cb0cc1e83173b9"},{"url":"https://git.kernel.org/stable/c/b2727326d0a53709380aa147018085d71a6d4843"}],"title":"net: txgbe: fix memory leak in txgbe_probe() error path","x_generator":{"engine":"bippy-1.2.0"}}}}