CVE-2025-39894
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's netfilter br_netfilter component. When a broadcast packet is sent to a tap device that is part of a bridge, the function br_nf_local_in() is called to confirm the connection tracking (conntrack). If another conntrack with the same hash value is added to the hash table, triggered by a normal packet to a non-bridge device, a warning is generated due to the use of an outdated conntrack reference after confirmation. The issue arises because br_nf_local_in() continues to use the old conntrack object after confirm() has updated it, leading to a warning and potential instability. The fix involves removing the unnecessary warning and properly handling the conntrack references to avoid this conflict.
How can this vulnerability impact me? :
This vulnerability can cause warnings and potential instability in the Linux kernel networking stack when handling certain packets on bridged tap devices. While it does not explicitly mention security breaches like data leaks or privilege escalation, the warning indicates a race or logic issue in connection tracking that could lead to unexpected behavior or kernel instability, potentially affecting network reliability and performance.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for the specific warning message related to br_nf_local_in(). You should look for kernel warnings similar to: "WARNING: CPU: ... at net/bridge/br_netfilter_hooks.c:632 br_nf_local_in+0x168/0x200" Using the command: journalctl -k | grep br_nf_local_in or dmesg | grep br_nf_local_in can help identify if this warning has occurred on your system.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by removing the problematic WARN_ON_ONCE and correcting the handling in br_nf_local_in(). Until an update is applied, monitoring for the warning messages and avoiding sending broadcast packets to tap devices added to a bridge may reduce triggering the issue.