CVE-2025-68241

MEDIUM
中文标题:
(暂无数据)
英文标题:
ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe
CVSS分数: -1.0
发布时间: 2025-12-16 14:21:18
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v2
漏洞描述
中文描述:

(暂无数据)

英文描述:

In the Linux kernel, the following vulnerability has been resolved: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe The sit driver's packet transmission path calls: sit_tunnel_xmit() -> update_or_create_fnhe(), which lead to fnhe_remove_oldest() being called to delete entries exceeding FNHE_RECLAIM_DEPTH+random. The race window is between fnhe_remove_oldest() selecting fnheX for deletion and the subsequent kfree_rcu(). During this time, the concurrent path's __mkroute_output() -> find_exception() can fetch the soon-to-be-deleted fnheX, and rt_bind_exception() then binds it with a new dst using a dst_hold(). When the original fnheX is freed via RCU, the dst reference remains permanently leaked. CPU 0 CPU 1 __mkroute_output() find_exception() [fnheX] update_or_create_fnhe() fnhe_remove_oldest() [fnheX] rt_bind_exception() [bind dst] RCU callback [fnheX freed, dst leak] This issue manifests as a device reference count leak and a warning in dmesg when unregistering the net device: unregister_netdevice: waiting for sitX to become free. Usage count = N Ido Schimmel provided the simple test validation method [1]. The fix clears 'oldest->fnhe_daddr' before calling fnhe_flush_routes(). Since rt_bind_exception() checks this field, setting it to zero prevents the stale fnhe from being reused and bound to a new dst just before it is freed. [1] ip netns add ns1 ip -n ns1 link set dev lo up ip -n ns1 address add 192.0.2.1/32 dev lo ip -n ns1 link add name dummy1 up type dummy ip -n ns1 route add 192.0.2.2/32 dev dummy1 ip -n ns1 link add name gretap1 up arp off type gretap \ local 192.0.2.1 remote 192.0.2.2 ip -n ns1 route add 198.51.0.0/16 dev gretap1 taskset -c 0 ip netns exec ns1 mausezahn gretap1 \ -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q & taskset -c 2 ip netns exec ns1 mausezahn gretap1 \ -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q & sleep 10 ip netns pids ns1 | xargs kill ip netns del ns1

CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Linux Linux bed8941fbdb72a61f6348c4deb0db69c4de87aca - - cpe:2.3:a:linux:linux:bed8941fbdb72a61f6348c4deb0db69c4de87aca:*:*:*:*:*:*:*
Linux Linux f10ce783bcc4d8ea454563a7d56ae781640e7dcb - - cpe:2.3:a:linux:linux:f10ce783bcc4d8ea454563a7d56ae781640e7dcb:*:*:*:*:*:*:*
Linux Linux f484595be6b7ef9d095a32becabb5dae8204fb2a - - cpe:2.3:a:linux:linux:f484595be6b7ef9d095a32becabb5dae8204fb2a:*:*:*:*:*:*:*
Linux Linux 3e6bd2b583f18da9856fc9741ffa200a74a52cba - - cpe:2.3:a:linux:linux:3e6bd2b583f18da9856fc9741ffa200a74a52cba:*:*:*:*:*:*:*
Linux Linux 5ae06218331f39ec45b5d039aa7cb3ddd4bb8008 - - cpe:2.3:a:linux:linux:5ae06218331f39ec45b5d039aa7cb3ddd4bb8008:*:*:*:*:*:*:*
Linux Linux 4589a12dcf80af31137ef202be1ff4a321707a73 - - cpe:2.3:a:linux:linux:4589a12dcf80af31137ef202be1ff4a321707a73:*:*:*:*:*:*:*
Linux Linux 5.15 - - cpe:2.3:a:linux:linux:5.15:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
CVSS评分详情
-1.0
LOW
CVSS向量: NOT_EXTRACTED
CVSS版本: NOT_EXTRACTED
机密性
N/A
完整性
N/A
可用性
N/A
时间信息
发布时间:
2025-12-16 14:21:18
修改时间:
2025-12-16 14:21:18
创建时间:
2026-01-12 02:12:29
更新时间:
2026-01-12 02:28:12
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-68241 2025-12-19 03:24:49 2026-01-12 02:12:29
NVD nvd_CVE-2025-68241 2025-12-19 03:25:39 2026-01-12 02:28:12
版本与语言
当前版本: v2
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
v2 NVD
2026-01-12 02:28:12
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']