๐Ÿ” CVE Alert

CVE-2025-21926

UNKNOWN 0.0

net: gso: fix ownership in __udp_gso_segment

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net: gso: fix ownership in __udp_gso_segment In __udp_gso_segment the skb destructor is removed before segmenting the skb but the socket reference is kept as-is. This is an issue if the original skb is later orphaned as we can hit the following bug: kernel BUG at ./include/linux/skbuff.h:3312! (skb_orphan) RIP: 0010:ip_rcv_core+0x8b2/0xca0 Call Trace: ip_rcv+0xab/0x6e0 __netif_receive_skb_one_core+0x168/0x1b0 process_backlog+0x384/0x1100 __napi_poll.constprop.0+0xa1/0x370 net_rx_action+0x925/0xe50 The above can happen following a sequence of events when using OpenVSwitch, when an OVS_ACTION_ATTR_USERSPACE action precedes an OVS_ACTION_ATTR_OUTPUT action: 1. OVS_ACTION_ATTR_USERSPACE is handled (in do_execute_actions): the skb goes through queue_gso_packets and then __udp_gso_segment, where its destructor is removed. 2. The segments' data are copied and sent to userspace. 3. OVS_ACTION_ATTR_OUTPUT is handled (in do_execute_actions) and the same original skb is sent to its path. 4. If it later hits skb_orphan, we hit the bug. Fix this by also removing the reference to the socket in __udp_gso_segment.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
ad405857b174ed31a97982bb129c320d03321cf5 < 9f28205ddb76e86cac418332e952241d85fed0dc ad405857b174ed31a97982bb129c320d03321cf5 < a2d1cca955ed34873e524cc2e6e885450d262f05 ad405857b174ed31a97982bb129c320d03321cf5 < 455217ac9db0cf9349b3933664355e907bb1a569 ad405857b174ed31a97982bb129c320d03321cf5 < e8db70537878e1bb3fd83e5abcc6feefc0587828 ad405857b174ed31a97982bb129c320d03321cf5 < 01a83237644d6822bc7df2c5564fc81b0df84358 ad405857b174ed31a97982bb129c320d03321cf5 < 084819b0d8b1bd433b90142371eb9450d657f8ca ad405857b174ed31a97982bb129c320d03321cf5 < c32da44cc9298eaa6109e3fc2c2b4e07cc4bf11b ad405857b174ed31a97982bb129c320d03321cf5 < ee01b2f2d7d0010787c2343463965bbc283a497f
Linux / Linux
4.18

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/9f28205ddb76e86cac418332e952241d85fed0dc git.kernel.org: https://git.kernel.org/stable/c/a2d1cca955ed34873e524cc2e6e885450d262f05 git.kernel.org: https://git.kernel.org/stable/c/455217ac9db0cf9349b3933664355e907bb1a569 git.kernel.org: https://git.kernel.org/stable/c/e8db70537878e1bb3fd83e5abcc6feefc0587828 git.kernel.org: https://git.kernel.org/stable/c/01a83237644d6822bc7df2c5564fc81b0df84358 git.kernel.org: https://git.kernel.org/stable/c/084819b0d8b1bd433b90142371eb9450d657f8ca git.kernel.org: https://git.kernel.org/stable/c/c32da44cc9298eaa6109e3fc2c2b4e07cc4bf11b git.kernel.org: https://git.kernel.org/stable/c/ee01b2f2d7d0010787c2343463965bbc283a497f lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html