{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-39764","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T07:20:57.126Z","datePublished":"2025-09-11T16:52:32.060Z","dateUpdated":"2026-05-11T21:35:48.352Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:35:48.352Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ctnetlink: remove refcounting in expectation dumpers\n\nSame pattern as previous patch: do not keep the expectation object\nalive via refcount, only store a cookie value and then use that\nas the skip hint for dump resumption.\n\nAFAICS this has the same issue as the one resolved in the conntrack\ndumper, when we do\n  if (!refcount_inc_not_zero(&exp->use))\n\nto increment the refcount, there is a chance that exp == last, which\ncauses a double-increment of the refcount and subsequent memory leak."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/netfilter/nf_conntrack_netlink.c"],"versions":[{"version":"cf6994c2b9812a9f02b99e89df411ffc5db9c779","lessThan":"b05500444b8eb97644efdd180839a04a706be97c","status":"affected","versionType":"git"},{"version":"cf6994c2b9812a9f02b99e89df411ffc5db9c779","lessThan":"bada48ad5b0590e318d0f79636ff62a2ef9f4955","status":"affected","versionType":"git"},{"version":"cf6994c2b9812a9f02b99e89df411ffc5db9c779","lessThan":"64b7684042246e3238464c66894e30ba30c7e851","status":"affected","versionType":"git"},{"version":"cf6994c2b9812a9f02b99e89df411ffc5db9c779","lessThan":"9e5021a906532ca16e2aac69c0607711e1c70b1f","status":"affected","versionType":"git"},{"version":"cf6994c2b9812a9f02b99e89df411ffc5db9c779","lessThan":"078d33c95bf534d37aa04269d1ae6158e20082d5","status":"affected","versionType":"git"},{"version":"cf6994c2b9812a9f02b99e89df411ffc5db9c779","lessThan":"a4d634ded4d3d400f115d84f654f316f249531c9","status":"affected","versionType":"git"},{"version":"cf6994c2b9812a9f02b99e89df411ffc5db9c779","lessThan":"1492e3dcb2be3aa46d1963da96aa9593e4e4db5a","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/netfilter/nf_conntrack_netlink.c"],"versions":[{"version":"2.6.23","status":"affected"},{"version":"0","lessThan":"2.6.23","status":"unaffected","versionType":"semver"},{"version":"5.10.253","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.203","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.167","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.130","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.78","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.16.2","lessThanOrEqual":"6.16.*","status":"unaffected","versionType":"semver"},{"version":"6.17","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.23","versionEndExcluding":"5.10.253"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.23","versionEndExcluding":"5.15.203"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.23","versionEndExcluding":"6.1.167"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.23","versionEndExcluding":"6.6.130"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.23","versionEndExcluding":"6.12.78"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.23","versionEndExcluding":"6.16.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.23","versionEndExcluding":"6.17"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/b05500444b8eb97644efdd180839a04a706be97c"},{"url":"https://git.kernel.org/stable/c/bada48ad5b0590e318d0f79636ff62a2ef9f4955"},{"url":"https://git.kernel.org/stable/c/64b7684042246e3238464c66894e30ba30c7e851"},{"url":"https://git.kernel.org/stable/c/9e5021a906532ca16e2aac69c0607711e1c70b1f"},{"url":"https://git.kernel.org/stable/c/078d33c95bf534d37aa04269d1ae6158e20082d5"},{"url":"https://git.kernel.org/stable/c/a4d634ded4d3d400f115d84f654f316f249531c9"},{"url":"https://git.kernel.org/stable/c/1492e3dcb2be3aa46d1963da96aa9593e4e4db5a"}],"title":"netfilter: ctnetlink: remove refcounting in expectation dumpers","x_generator":{"engine":"bippy-1.2.0"}}}}