Home

Description

In the Linux kernel, the following vulnerability has been resolved: ipvs: Defer ip_vs_ftp unregister during netns cleanup On the netns cleanup path, __ip_vs_ftp_exit() may unregister ip_vs_ftp before connections with valid cp->app pointers are flushed, leading to a use-after-free. Fix this by introducing a global `exiting_module` flag, set to true in ip_vs_ftp_exit() before unregistering the pernet subsystem. In __ip_vs_ftp_exit(), skip ip_vs_ftp unregister if called during netns cleanup (when exiting_module is false) and defer it to __ip_vs_cleanup_batch(), which unregisters all apps after all connections are flushed. If called during module exit, unregister ip_vs_ftp immediately.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-24 | Updated 2025-10-29 | Assigner Linux

Product status

Default status
unaffected

61b1ab4583e275af216c8454b9256de680499b19 (git) before 8a6ecab3847c213ce2855b0378e63ce839085de3
affected

61b1ab4583e275af216c8454b9256de680499b19 (git) before 421b1ae1574dfdda68b835c15ac4921ec0030182
affected

61b1ab4583e275af216c8454b9256de680499b19 (git) before 1d79471414d7b9424d699afff2aa79fff322f52d
affected

61b1ab4583e275af216c8454b9256de680499b19 (git) before 53717f8a4347b78eac6488072ad8e5adbaff38d9
affected

61b1ab4583e275af216c8454b9256de680499b19 (git) before 8cbe2a21d85727b66d7c591fd5d83df0d8c4f757
affected

61b1ab4583e275af216c8454b9256de680499b19 (git) before dc1a481359a72ee7e548f1f5da671282a7c13b8f
affected

61b1ab4583e275af216c8454b9256de680499b19 (git) before a343811ef138a265407167294275201621e9ebb2
affected

61b1ab4583e275af216c8454b9256de680499b19 (git) before 134121bfd99a06d44ef5ba15a9beb075297c0821
affected

Default status
affected

2.6.39
affected

Any version before 2.6.39
unaffected

5.4.301 (semver)
unaffected

5.10.246 (semver)
unaffected

5.15.195 (semver)
unaffected

6.1.156 (semver)
unaffected

6.6.112 (semver)
unaffected

6.12.53 (semver)
unaffected

6.17.3 (semver)
unaffected

6.18-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/8a6ecab3847c213ce2855b0378e63ce839085de3

git.kernel.org/...c/421b1ae1574dfdda68b835c15ac4921ec0030182

git.kernel.org/...c/1d79471414d7b9424d699afff2aa79fff322f52d

git.kernel.org/...c/53717f8a4347b78eac6488072ad8e5adbaff38d9

git.kernel.org/...c/8cbe2a21d85727b66d7c591fd5d83df0d8c4f757

git.kernel.org/...c/dc1a481359a72ee7e548f1f5da671282a7c13b8f

git.kernel.org/...c/a343811ef138a265407167294275201621e9ebb2

git.kernel.org/...c/134121bfd99a06d44ef5ba15a9beb075297c0821

cve.org (CVE-2025-40018)

nvd.nist.gov (CVE-2025-40018)

Download JSON