
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability (CVE-2025-39826) was discovered in the ROSE network protocol implementation. The issue involves the 'use' field in struct rose_neigh which is used as a reference counter but lacks atomicity (NVD). The vulnerability was disclosed on September 16, 2025, affecting Linux kernel systems using the ROSE network protocol.
The vulnerability stems from a race condition where a roseneigh structure could be freed while still being referenced by other code paths. Specifically, when roseneigh->use becomes zero during an ioctl operation via rosertioctl(), the structure may be removed while its timer is still active, potentially causing use-after-free issues (NVD).
The vulnerability could lead to use-after-free issues in the Linux kernel's ROSE network protocol implementation, potentially resulting in system instability or crashes (NVD).
The issue has been patched by changing the type of 'use' from unsigned short to refcountt and updating all code paths to use roseneighhold() and roseneigh_put() which operate reference counts atomically. The fix has been included in various Linux distribution updates, including Debian's version 6.1.153-1 for the oldstable distribution (bookworm) (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."