In the Linux kernel, the following vulnerability has been resolved:
net: airoha: fix potential use-after-free in airoha_npu_get()
np->name was being used after calling of_node_put(np), which
releases the node and can lead to a use-after-free bug.
Previously, of_node_put(np) was called unconditionally after
of_find_device_by_node(np), which could result in a use-after-free if
pdev is NULL.
This patch moves of_node_put(np) after the error check to ensure
the node is only released after both the error and success cases
are handled appropriately, preventing potential resource issues.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Aug 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Sat, 16 Aug 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: net: airoha: fix potential use-after-free in airoha_npu_get() np->name was being used after calling of_node_put(np), which releases the node and can lead to a use-after-free bug. Previously, of_node_put(np) was called unconditionally after of_find_device_by_node(np), which could result in a use-after-free if pdev is NULL. This patch moves of_node_put(np) after the error check to ensure the node is only released after both the error and success cases are handled appropriately, preventing potential resource issues. | |
Title | net: airoha: fix potential use-after-free in airoha_npu_get() | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-08-16T11:12:28.627Z
Updated: 2025-08-16T11:12:28.627Z
Reserved: 2025-04-16T04:51:24.024Z
Link: CVE-2025-38536

No data.

Status : Received
Published: 2025-08-16T12:15:29.347
Modified: 2025-08-16T12:15:29.347
Link: CVE-2025-38536
