{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T20:50:35.333","vulnerabilities":[{"cve":{"id":"CVE-2025-21677","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-01-31T12:15:28.877","lastModified":"2025-10-15T13:41:46.980","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\npfcp: Destroy device along with udp socket's netns dismantle.\n\npfcp_newlink() links the device to a list in dev_net(dev) instead\nof net, where a udp tunnel socket is created.\n\nEven when net is removed, the device stays alive on dev_net(dev).\nThen, removing net triggers the splat below. [0]\n\nIn this example, pfcp0 is created in ns2, but the udp socket is\ncreated in ns1.\n\n  ip netns add ns1\n  ip netns add ns2\n  ip -n ns1 link add netns ns2 name pfcp0 type pfcp\n  ip netns del ns1\n\nLet's link the device to the socket's netns instead.\n\nNow, pfcp_net_exit() needs another netdev iteration to remove\nall pfcp devices in the netns.\n\npfcp_dev_list is not used under RCU, so the list API is converted\nto the non-RCU variant.\n\npfcp_net_exit() can be converted to .exit_batch_rtnl() in net-next.\n\n[0]:\nref_tracker: net notrefcnt@00000000128b34dc has 1\/1 users at\n     sk_alloc (.\/include\/net\/net_namespace.h:345 net\/core\/sock.c:2236)\n     inet_create (net\/ipv4\/af_inet.c:326 net\/ipv4\/af_inet.c:252)\n     __sock_create (net\/socket.c:1558)\n     udp_sock_create4 (net\/ipv4\/udp_tunnel_core.c:18)\n     pfcp_create_sock (drivers\/net\/pfcp.c:168)\n     pfcp_newlink (drivers\/net\/pfcp.c:182 drivers\/net\/pfcp.c:197)\n     rtnl_newlink (net\/core\/rtnetlink.c:3786 net\/core\/rtnetlink.c:3897 net\/core\/rtnetlink.c:4012)\n     rtnetlink_rcv_msg (net\/core\/rtnetlink.c:6922)\n     netlink_rcv_skb (net\/netlink\/af_netlink.c:2542)\n     netlink_unicast (net\/netlink\/af_netlink.c:1321 net\/netlink\/af_netlink.c:1347)\n     netlink_sendmsg (net\/netlink\/af_netlink.c:1891)\n     ____sys_sendmsg (net\/socket.c:711 net\/socket.c:726 net\/socket.c:2583)\n     ___sys_sendmsg (net\/socket.c:2639)\n     __sys_sendmsg (net\/socket.c:2669)\n     do_syscall_64 (arch\/x86\/entry\/common.c:52 arch\/x86\/entry\/common.c:83)\n     entry_SYSCALL_64_after_hwframe (arch\/x86\/entry\/entry_64.S:130)\n\nWARNING: CPU: 1 PID: 11 at lib\/ref_tracker.c:179 ref_tracker_dir_exit (lib\/ref_tracker.c:179)\nModules linked in:\nCPU: 1 UID: 0 PID: 11 Comm: kworker\/u16:0 Not tainted 6.13.0-rc5-00147-g4c1224501e9d #5\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04\/01\/2014\nWorkqueue: netns cleanup_net\nRIP: 0010:ref_tracker_dir_exit (lib\/ref_tracker.c:179)\nCode: 00 00 00 fc ff df 4d 8b 26 49 bd 00 01 00 00 00 00 ad de 4c 39 f5 0f 85 df 00 00 00 48 8b 74 24 08 48 89 df e8 a5 cc 12 02 90 <0f> 0b 90 48 8d 6b 44 be 04 00 00 00 48 89 ef e8 80 de 67 ff 48 89\nRSP: 0018:ff11000007f3fb60 EFLAGS: 00010286\nRAX: 00000000000020ef RBX: ff1100000d6481e0 RCX: 1ffffffff0e40d82\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8423ee3c\nRBP: ff1100000d648230 R08: 0000000000000001 R09: fffffbfff0e395af\nR10: 0000000000000001 R11: 0000000000000000 R12: ff1100000d648230\nR13: dead000000000100 R14: ff1100000d648230 R15: dffffc0000000000\nFS:  0000000000000000(0000) GS:ff1100006ce80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00005620e1363990 CR3: 000000000eeb2002 CR4: 0000000000771ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n <TASK>\n ? __warn (kernel\/panic.c:748)\n ? ref_tracker_dir_exit (lib\/ref_tracker.c:179)\n ? report_bug (lib\/bug.c:201 lib\/bug.c:219)\n ? handle_bug (arch\/x86\/kernel\/traps.c:285)\n ? exc_invalid_op (arch\/x86\/kernel\/traps.c:309 (discriminator 1))\n ? asm_exc_invalid_op (.\/arch\/x86\/include\/asm\/idtentry.h:621)\n ? _raw_spin_unlock_irqrestore (.\/arch\/x86\/include\/asm\/irqflags.h:42 .\/arch\/x86\/include\/asm\/irqflags.h:97 .\/arch\/x86\/include\/asm\/irqflags.h:155 .\/include\/linux\/spinlock_api_smp.h:151 kernel\/locking\/spinlock.c:194)\n ? ref_tracker_dir_exit (lib\/ref_tracker.c:179)\n ? __pfx_ref_tracker_dir_exit (lib\/ref_tracker.c:158)\n ? kfree (mm\/slub.c:4613 mm\/slub.c:4761)\n net_free (net\/core\/net_namespace.c:476 net\/core\/net_namespace.c:467)\n cleanup_net (net\/cor\n---truncated---"},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pfcp: Destruye el dispositivo junto con el desmantelamiento de netns del socket udp. pfcp_newlink() vincula el dispositivo a una lista en dev_net(dev) en lugar de net, donde se crea un socket de túnel udp. Incluso cuando se elimina net, el dispositivo permanece activo en dev_net(dev). Luego, eliminar net activa el splat a continuación. [0] En este ejemplo, pfcp0 se crea en ns2, pero el socket udp se crea en ns1. ip netns add ns1 ip netns add ns2 ip -n ns1 link add netns ns2 name pfcp0 type pfcp ip netns del ns1 Vinculemos el dispositivo al netns del socket en su lugar. Ahora, pfcp_net_exit() necesita otra iteración netdev para eliminar todos los dispositivos pfcp en el netns. pfcp_dev_list no se utiliza en RCU, por lo que la API de lista se convierte a la variante que no es RCU. pfcp_net_exit() can be converted to .exit_batch_rtnl() in net-next. [0]: ref_tracker: net notrefcnt@00000000128b34dc has 1\/1 users at sk_alloc (.\/include\/net\/net_namespace.h:345 net\/core\/sock.c:2236) inet_create (net\/ipv4\/af_inet.c:326 net\/ipv4\/af_inet.c:252) __sock_create (net\/socket.c:1558) udp_sock_create4 (net\/ipv4\/udp_tunnel_core.c:18) pfcp_create_sock (drivers\/net\/pfcp.c:168) pfcp_newlink (drivers\/net\/pfcp.c:182 drivers\/net\/pfcp.c:197) rtnl_newlink (net\/core\/rtnetlink.c:3786 net\/core\/rtnetlink.c:3897 net\/core\/rtnetlink.c:4012) rtnetlink_rcv_msg (net\/core\/rtnetlink.c:6922) netlink_rcv_skb (net\/netlink\/af_netlink.c:2542) netlink_unicast (net\/netlink\/af_netlink.c:1321 net\/netlink\/af_netlink.c:1347) netlink_sendmsg (net\/netlink\/af_netlink.c:1891) ____sys_sendmsg (net\/socket.c:711 net\/socket.c:726 net\/socket.c:2583) ___sys_sendmsg (net\/socket.c:2639) __sys_sendmsg (net\/socket.c:2669) do_syscall_64 (arch\/x86\/entry\/common.c:52 arch\/x86\/entry\/common.c:83) entry_SYSCALL_64_after_hwframe (arch\/x86\/entry\/entry_64.S:130) WARNING: CPU: 1 PID: 11 at lib\/ref_tracker.c:179 ref_tracker_dir_exit (lib\/ref_tracker.c:179) Modules linked in: CPU: 1 UID: 0 PID: 11 Comm: kworker\/u16:0 Not tainted 6.13.0-rc5-00147-g4c1224501e9d #5 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04\/01\/2014 Workqueue: netns cleanup_net RIP: 0010:ref_tracker_dir_exit (lib\/ref_tracker.c:179) Code: 00 00 00 fc ff df 4d 8b 26 49 bd 00 01 00 00 00 00 ad de 4c 39 f5 0f 85 df 00 00 00 48 8b 74 24 08 48 89 df e8 a5 cc 12 02 90 &lt;0f&gt; 0b 90 48 8d 6b 44 be 04 00 00 00 48 89 ef e8 80 de 67 ff 48 89 RSP: 0018:ff11000007f3fb60 EFLAGS: 00010286 RAX: 00000000000020ef RBX: ff1100000d6481e0 RCX: 1ffffffff0e40d82 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8423ee3c RBP: ff1100000d648230 R08: 0000000000000001 R09: fffffbfff0e395af R10: 0000000000000001 R11: 0000000000000000 R12: ff1100000d648230 R13: dead000000000100 R14: ff1100000d648230 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ff1100006ce80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005620e1363990 CR3: 000000000eeb2002 CR4: 0000000000771ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400 PKRU: 55555554 Call Trace:  ? __warn (kernel\/panic.c:748) ? ref_tracker_dir_exit (lib\/ref_tracker.c:179) ? report_bug (lib\/bug.c:201 lib\/bug.c:219) ? handle_bug (arch\/x86\/kernel\/traps.c:285) ? exc_invalid_op (arch\/x86\/kernel\/traps.c:309 (discriminator 1)) ? asm_exc_invalid_op (.\/arch\/x86\/include\/asm\/idtentry.h:621) ? _raw_spin_unlock_irqrestore (.\/arch\/x86\/include\/asm\/irqflags.h:42 .\/arch\/x86\/include\/asm\/irqflags.h:97 .\/arch\/x86\/include\/asm\/irqflags.h:155 .\/include\/linux\/spinlock_api_smp.h:151 kernel\/locking\/spinlock.c:194) ? ref_tracker_dir_exit (lib\/ref_tracker.c:179) ? __pfx_ref_tracker_dir_exit (lib\/ref_tracker.c:158) ? kfree (mm\/slub.c:4613 mm\/slub.c:4761) net_free (net\/core\/net_namespace.c:476 net\/core\/net_namespace.c:467) cleanup_net (net\/cor ---truncated--- "}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10","versionEndExcluding":"6.12.11","matchCriteriaId":"6286FEA9-6512-4F9C-BC4B-946CCBF33127"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*","matchCriteriaId":"62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*","matchCriteriaId":"5A073481-106D-4B15-B4C7-FB0213B8E1D4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*","matchCriteriaId":"DE491969-75AE-4A6B-9A58-8FC5AF98798F"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*","matchCriteriaId":"93C0660D-7FB8-4FBA-892A-B064BA71E49E"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*","matchCriteriaId":"034C36A6-C481-41F3-AE9A-D116E5BE6895"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*","matchCriteriaId":"8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*","matchCriteriaId":"5DFCDFB8-4FD0-465A-9076-D813D78FE51B"}]}]}],"references":[{"url":"https:\/\/git.kernel.org\/stable\/c\/1c35a66e2bfea53dea3562b2575ac7fd4c38ee61","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https:\/\/git.kernel.org\/stable\/c\/ffc90e9ca61b0f619326a1417ff32efd6cc71ed2","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}