
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability (CVE-2025-39768) has been identified in the net/mlx5 HWS complex rules rehash error flow. The issue affects the process of moving rules from matcher to matcher, where failure handling could lead to system instability. This vulnerability was disclosed on September 11, 2025 (NVD).
The vulnerability stems from improper error handling in the complex rules rehash logic. When moving rules between matchers fails, the system could experience soft lock-ups or other problematic behavior instead of gracefully handling the error condition. The issue specifically affects the error flow for moving complex rules, including scenarios where new rule creation fails before enqueuing, timeout occurs during rule movement, or when other completion errors are received (NVD).
If exploited, this vulnerability could cause the kernel to experience soft lock-ups or other system stability issues when handling rule movement failures. This could potentially affect the overall system functionality, particularly in scenarios where steering rules become broken (NVD).
A patch has been developed to address the error flow issues. The fix includes: not polling for completion if new rule creation fails before enqueuing, aborting the rehash sequence if a timeout occurs, continuing to handle remaining rules if other completion errors are received, and ensuring the original error code is returned to the caller (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."