We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-21926

net: gso: fix ownership in __udp_gso_segment



Description

In the Linux kernel, the following vulnerability has been resolved: net: gso: fix ownership in __udp_gso_segment In __udp_gso_segment the skb destructor is removed before segmenting the skb but the socket reference is kept as-is. This is an issue if the original skb is later orphaned as we can hit the following bug: kernel BUG at ./include/linux/skbuff.h:3312! (skb_orphan) RIP: 0010:ip_rcv_core+0x8b2/0xca0 Call Trace: ip_rcv+0xab/0x6e0 __netif_receive_skb_one_core+0x168/0x1b0 process_backlog+0x384/0x1100 __napi_poll.constprop.0+0xa1/0x370 net_rx_action+0x925/0xe50 The above can happen following a sequence of events when using OpenVSwitch, when an OVS_ACTION_ATTR_USERSPACE action precedes an OVS_ACTION_ATTR_OUTPUT action: 1. OVS_ACTION_ATTR_USERSPACE is handled (in do_execute_actions): the skb goes through queue_gso_packets and then __udp_gso_segment, where its destructor is removed. 2. The segments' data are copied and sent to userspace. 3. OVS_ACTION_ATTR_OUTPUT is handled (in do_execute_actions) and the same original skb is sent to its path. 4. If it later hits skb_orphan, we hit the bug. Fix this by also removing the reference to the socket in __udp_gso_segment.

Reserved 2024-12-29 | Published 2025-04-01 | Updated 2025-04-01 | Assigner Linux

Product status

Default status
unaffected

ad405857b174ed31a97982bb129c320d03321cf5 before 9f28205ddb76e86cac418332e952241d85fed0dc
affected

ad405857b174ed31a97982bb129c320d03321cf5 before a2d1cca955ed34873e524cc2e6e885450d262f05
affected

ad405857b174ed31a97982bb129c320d03321cf5 before 455217ac9db0cf9349b3933664355e907bb1a569
affected

ad405857b174ed31a97982bb129c320d03321cf5 before e8db70537878e1bb3fd83e5abcc6feefc0587828
affected

ad405857b174ed31a97982bb129c320d03321cf5 before 01a83237644d6822bc7df2c5564fc81b0df84358
affected

ad405857b174ed31a97982bb129c320d03321cf5 before 084819b0d8b1bd433b90142371eb9450d657f8ca
affected

ad405857b174ed31a97982bb129c320d03321cf5 before c32da44cc9298eaa6109e3fc2c2b4e07cc4bf11b
affected

ad405857b174ed31a97982bb129c320d03321cf5 before ee01b2f2d7d0010787c2343463965bbc283a497f
affected

Default status
affected

4.18
affected

Any version before 4.18
unaffected

5.4.291
unaffected

5.10.235
unaffected

5.15.179
unaffected

6.1.131
unaffected

6.6.83
unaffected

6.12.19
unaffected

6.13.7
unaffected

6.14
unaffected

References

git.kernel.org/...c/9f28205ddb76e86cac418332e952241d85fed0dc

git.kernel.org/...c/a2d1cca955ed34873e524cc2e6e885450d262f05

git.kernel.org/...c/455217ac9db0cf9349b3933664355e907bb1a569

git.kernel.org/...c/e8db70537878e1bb3fd83e5abcc6feefc0587828

git.kernel.org/...c/01a83237644d6822bc7df2c5564fc81b0df84358

git.kernel.org/...c/084819b0d8b1bd433b90142371eb9450d657f8ca

git.kernel.org/...c/c32da44cc9298eaa6109e3fc2c2b4e07cc4bf11b

git.kernel.org/...c/ee01b2f2d7d0010787c2343463965bbc283a497f

cve.org (CVE-2025-21926)

nvd.nist.gov (CVE-2025-21926)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-21926

Support options

Helpdesk Chat, Email, Knowledgebase