๐Ÿ” CVE Alert

CVE-2025-22005

MEDIUM 5.5

ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw().

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw(). fib_check_nh_v6_gw() expects that fib6_nh_init() cleans up everything when it fails. Commit 7dd73168e273 ("ipv6: Always allocate pcpu memory in a fib6_nh") moved fib_nh_common_init() before alloc_percpu_gfp() within fib6_nh_init() but forgot to add cleanup for fib6_nh->nh_common.nhc_pcpu_rth_output in case it fails to allocate fib6_nh->rt6i_pcpu, resulting in memleak. Let's call fib_nh_common_release() and clear nhc_pcpu_rth_output in the error path. Note that we can remove the fib6_nh_release() call in nh_create_ipv6() later in net-next.git.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 3, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
7dd73168e273938b9e9bb42ca51b0c27d807992b < 16267a5036173d0173377545b4b6021b081d0933 7dd73168e273938b9e9bb42ca51b0c27d807992b < 1bd12dfc058e1e68759d313d7727d68dbc1b8964 7dd73168e273938b9e9bb42ca51b0c27d807992b < 596a883c4ce2d2e9c175f25b98fed3a1f33fea38 7dd73168e273938b9e9bb42ca51b0c27d807992b < 77c41cdbe6bce476e08d3251c0d501feaf10a9f3 7dd73168e273938b9e9bb42ca51b0c27d807992b < 119dcafe36795a15ae53351cbbd6177aaf94ffef 7dd73168e273938b9e9bb42ca51b0c27d807992b < 29d91820184d5cbc70f3246d4911d96eaeb930d6 7dd73168e273938b9e9bb42ca51b0c27d807992b < d3d5b4b5ae263c3225db363ba08b937e2e2b0380 7dd73168e273938b9e9bb42ca51b0c27d807992b < 9740890ee20e01f99ff1dde84c63dcf089fabb98
Linux / Linux
5.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/16267a5036173d0173377545b4b6021b081d0933 git.kernel.org: https://git.kernel.org/stable/c/1bd12dfc058e1e68759d313d7727d68dbc1b8964 git.kernel.org: https://git.kernel.org/stable/c/596a883c4ce2d2e9c175f25b98fed3a1f33fea38 git.kernel.org: https://git.kernel.org/stable/c/77c41cdbe6bce476e08d3251c0d501feaf10a9f3 git.kernel.org: https://git.kernel.org/stable/c/119dcafe36795a15ae53351cbbd6177aaf94ffef git.kernel.org: https://git.kernel.org/stable/c/29d91820184d5cbc70f3246d4911d96eaeb930d6 git.kernel.org: https://git.kernel.org/stable/c/d3d5b4b5ae263c3225db363ba08b937e2e2b0380 git.kernel.org: https://git.kernel.org/stable/c/9740890ee20e01f99ff1dde84c63dcf089fabb98 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html