CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-37872: net: txgbe: fix memory leak in txgbe_probe() error path

Description

In the Linux kernel, the following vulnerability has been resolved:

net: txgbe: fix memory leak in txgbe_probe() error path

When txgbe_sw_init() is called, memory is allocated for wx->rss_key
in wx_init_rss_key(). However, in txgbe_probe() function, the subsequent
error paths after txgbe_sw_init() don't free the rss_key. Fix that by
freeing it in error path along with wx->mac_table.

Also change the label to which execution jumps when txgbe_sw_init()
fails, because otherwise, it could lead to a double free for rss_key,
when the mac_table allocation fails in wx_sw_init().

Classification

CVE ID: CVE-2025-37872

Affected Products

Vendor: Linux

Product: Linux

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.02% (probability of being exploited)

EPSS Percentile: 4.33% (scored less or equal to compared to others)

EPSS Date: 2025-06-07 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-37872
https://git.kernel.org/stable/c/635863d93deb8e352d63a8eba852efeaf1ac3539
https://git.kernel.org/stable/c/837197a722919f5b0eeb967fe7cb0cc1e83173b9
https://git.kernel.org/stable/c/b2727326d0a53709380aa147018085d71a6d4843

Timeline