๐Ÿ” CVE Alert

CVE-2025-40215

UNKNOWN 0.0

xfrm: delete x->tunnel as we delete x

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: xfrm: delete x->tunnel as we delete x The ipcomp fallback tunnels currently get deleted (from the various lists and hashtables) as the last user state that needed that fallback is destroyed (not deleted). If a reference to that user state still exists, the fallback state will remain on the hashtables/lists, triggering the WARN in xfrm_state_fini. Because of those remaining references, the fix in commit f75a2804da39 ("xfrm: destroy xfrm_state synchronously on net exit path") is not complete. We recently fixed one such situation in TCP due to defered freeing of skbs (commit 9b6412e6979f ("tcp: drop secpath at the same time as we currently drop dst")). This can also happen due to IP reassembly: skbs with a secpath remain on the reassembly queue until netns destruction. If we can't guarantee that the queues are flushed by the time xfrm_state_fini runs, there may still be references to a (user) xfrm_state, preventing the timely deletion of the corresponding fallback state. Instead of chasing each instance of skbs holding a secpath one by one, this patch fixes the issue directly within xfrm, by deleting the fallback state as soon as the last user state depending on it has been deleted. Destruction will still happen when the final reference is dropped. A separate lockdep class for the fallback state is required since we're going to lock x->tunnel while x is locked.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 4, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
9d4139c76905833afcb77fe8ccc17f302a0eb9ab < 1b28a7fae0128fa140a7dccd995182ff6cd1c67b 9d4139c76905833afcb77fe8ccc17f302a0eb9ab < 4b2c17d0f9be8b58bb30468bc81a4b61c985b04e 9d4139c76905833afcb77fe8ccc17f302a0eb9ab < 0da961fa46da1b37ef868d9b603bd202136f8f8e 9d4139c76905833afcb77fe8ccc17f302a0eb9ab < d0e0d1097118461463b76562c7ebaabaa5b90b13 9d4139c76905833afcb77fe8ccc17f302a0eb9ab < dc3636912d41770466543623cb76e7b88fdb42c7 9d4139c76905833afcb77fe8ccc17f302a0eb9ab < b441cf3f8c4b8576639d20c8eb4aa32917602ecd
Linux / Linux
2.6.29

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/1b28a7fae0128fa140a7dccd995182ff6cd1c67b git.kernel.org: https://git.kernel.org/stable/c/4b2c17d0f9be8b58bb30468bc81a4b61c985b04e git.kernel.org: https://git.kernel.org/stable/c/0da961fa46da1b37ef868d9b603bd202136f8f8e git.kernel.org: https://git.kernel.org/stable/c/d0e0d1097118461463b76562c7ebaabaa5b90b13 git.kernel.org: https://git.kernel.org/stable/c/dc3636912d41770466543623cb76e7b88fdb42c7 git.kernel.org: https://git.kernel.org/stable/c/b441cf3f8c4b8576639d20c8eb4aa32917602ecd