CVE-2025-68241
中文标题:
(暂无数据)
英文标题:
ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe
漏洞描述
中文描述:
(暂无数据)
英文描述:
In the Linux kernel, the following vulnerability has been resolved: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe The sit driver's packet transmission path calls: sit_tunnel_xmit() -> update_or_create_fnhe(), which lead to fnhe_remove_oldest() being called to delete entries exceeding FNHE_RECLAIM_DEPTH+random. The race window is between fnhe_remove_oldest() selecting fnheX for deletion and the subsequent kfree_rcu(). During this time, the concurrent path's __mkroute_output() -> find_exception() can fetch the soon-to-be-deleted fnheX, and rt_bind_exception() then binds it with a new dst using a dst_hold(). When the original fnheX is freed via RCU, the dst reference remains permanently leaked. CPU 0 CPU 1 __mkroute_output() find_exception() [fnheX] update_or_create_fnhe() fnhe_remove_oldest() [fnheX] rt_bind_exception() [bind dst] RCU callback [fnheX freed, dst leak] This issue manifests as a device reference count leak and a warning in dmesg when unregistering the net device: unregister_netdevice: waiting for sitX to become free. Usage count = N Ido Schimmel provided the simple test validation method [1]. The fix clears 'oldest->fnhe_daddr' before calling fnhe_flush_routes(). Since rt_bind_exception() checks this field, setting it to zero prevents the stale fnhe from being reused and bound to a new dst just before it is freed. [1] ip netns add ns1 ip -n ns1 link set dev lo up ip -n ns1 address add 192.0.2.1/32 dev lo ip -n ns1 link add name dummy1 up type dummy ip -n ns1 route add 192.0.2.2/32 dev dummy1 ip -n ns1 link add name gretap1 up arp off type gretap \ local 192.0.2.1 remote 192.0.2.2 ip -n ns1 route add 198.51.0.0/16 dev gretap1 taskset -c 0 ip netns exec ns1 mausezahn gretap1 \ -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q & taskset -c 2 ip netns exec ns1 mausezahn gretap1 \ -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q & sleep 10 ip netns pids ns1 | xargs kill ip netns del ns1
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Linux | Linux | bed8941fbdb72a61f6348c4deb0db69c4de87aca | - | - |
cpe:2.3:a:linux:linux:bed8941fbdb72a61f6348c4deb0db69c4de87aca:*:*:*:*:*:*:*
|
| Linux | Linux | f10ce783bcc4d8ea454563a7d56ae781640e7dcb | - | - |
cpe:2.3:a:linux:linux:f10ce783bcc4d8ea454563a7d56ae781640e7dcb:*:*:*:*:*:*:*
|
| Linux | Linux | f484595be6b7ef9d095a32becabb5dae8204fb2a | - | - |
cpe:2.3:a:linux:linux:f484595be6b7ef9d095a32becabb5dae8204fb2a:*:*:*:*:*:*:*
|
| Linux | Linux | 3e6bd2b583f18da9856fc9741ffa200a74a52cba | - | - |
cpe:2.3:a:linux:linux:3e6bd2b583f18da9856fc9741ffa200a74a52cba:*:*:*:*:*:*:*
|
| Linux | Linux | 5ae06218331f39ec45b5d039aa7cb3ddd4bb8008 | - | - |
cpe:2.3:a:linux:linux:5ae06218331f39ec45b5d039aa7cb3ddd4bb8008:*:*:*:*:*:*:*
|
| Linux | Linux | 4589a12dcf80af31137ef202be1ff4a321707a73 | - | - |
cpe:2.3:a:linux:linux:4589a12dcf80af31137ef202be1ff4a321707a73:*:*:*:*:*:*:*
|
| Linux | Linux | 5.15 | - | - |
cpe:2.3:a:linux:linux:5.15:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
NOT_EXTRACTED
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-68241 |
2025-12-19 03:24:49 | 2026-01-12 02:12:29 |
| NVD | nvd_CVE-2025-68241 |
2025-12-19 03:25:39 | 2026-01-12 02:28:12 |
版本与语言
安全公告
变更历史
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']