CVE-2025-39965
xfrm: xfrm_alloc_spi shouldn't use 0 as SPI
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI x->id.spi == 0 means "no SPI assigned", but since commit 94f39804d891 ("xfrm: Duplicate SPI Handling"), we now create states and add them to the byspi list with this value. __xfrm_state_delete doesn't remove those states from the byspi list, since they shouldn't be there, and this shows up as a UAF the next time we go through the byspi list.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 13, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
3d8090bb53424432fa788fe9a49e8ceca74f0544 < 0baf92d0b1590b903c1f4ead75e61715e50e8146 2fc5b54368a1bf1d2d74b4d3b8eea5309a653e38 < 9fcedabaae0096f712bbb4ccca6a8538af1cd1c8 29e9158f91f99057dbd35db5e8674d93b38549fe < a78e55776522373c446f18d5002a8de4b09e6bf7 94f39804d891cffe4ce17737d295f3b195bc7299 < cd8ae32e4e4652db55bce6b9c79267d8946765a9 c67d4e7a8f90fb6361ca89d4d5c9a28f4e935e47
Linux / Linux
6.6.103 < 6.6.109 6.12.43 < 6.12.50 6.16.2 < 6.16.10
References
git.kernel.org: https://git.kernel.org/stable/c/0baf92d0b1590b903c1f4ead75e61715e50e8146 git.kernel.org: https://git.kernel.org/stable/c/9fcedabaae0096f712bbb4ccca6a8538af1cd1c8 git.kernel.org: https://git.kernel.org/stable/c/a78e55776522373c446f18d5002a8de4b09e6bf7 git.kernel.org: https://git.kernel.org/stable/c/cd8ae32e4e4652db55bce6b9c79267d8946765a9