{"id":"CVE-2025-21975","summary":"net/mlx5: handle errors in mlx5_chains_create_table()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: handle errors in mlx5_chains_create_table()\n\nIn mlx5_chains_create_table(), the return value of mlx5_get_fdb_sub_ns()\nand mlx5_get_flow_namespace() must be checked to prevent NULL pointer\ndereferences. If either function fails, the function should log error\nmessage with mlx5_core_warn() and return error pointer.","modified":"2026-04-16T04:32:56.788813518Z","published":"2025-04-01T15:47:06.590Z","related":["SUSE-SU-2025:01614-1","SUSE-SU-2025:01707-1","SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01964-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20206-1","SUSE-SU-2025:20270-1","SUSE-SU-2025:20283-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21975.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/093b4aaec97ec048623e3fe1e516fc45a954d412"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1598307c914ba3d2642a2b03d1ff11efbdb7c6c2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/15bdd93728369b2c8942a8e5d549d4b5dc04a2d9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1d34296409a519b4027750e3e82d9e19553a7398"},{"type":"WEB","url":"https://git.kernel.org/stable/c/29c419c64e9b396baeda1d8713d2aa3ba7c0acf6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/637105ef0d46fe5beac15aceb431da3ec832bb00"},{"type":"WEB","url":"https://git.kernel.org/stable/c/eab0396353be1c778eba1c0b5180176f04dd21ce"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21975.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21975"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"39ac237ce00968545e7298faa9e07ecb7e440fb5"},{"fixed":"15bdd93728369b2c8942a8e5d549d4b5dc04a2d9"},{"fixed":"29c419c64e9b396baeda1d8713d2aa3ba7c0acf6"},{"fixed":"1598307c914ba3d2642a2b03d1ff11efbdb7c6c2"},{"fixed":"637105ef0d46fe5beac15aceb431da3ec832bb00"},{"fixed":"1d34296409a519b4027750e3e82d9e19553a7398"},{"fixed":"093b4aaec97ec048623e3fe1e516fc45a954d412"},{"fixed":"eab0396353be1c778eba1c0b5180176f04dd21ce"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21975.json"}}],"schema_version":"1.7.5"}