CVE-2025-40206
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-12

Last updated on: 2025-11-14

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_objref: validate objref and objrefmap expressions Referencing a synproxy stateful object from OUTPUT hook causes kernel crash due to infinite recursive calls: BUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12) [...] Call Trace: __find_rr_leaf+0x99/0x230 fib6_table_lookup+0x13b/0x2d0 ip6_pol_route+0xa4/0x400 fib6_rule_lookup+0x156/0x240 ip6_route_output_flags+0xc6/0x150 __nf_ip6_route+0x23/0x50 synproxy_send_tcp_ipv6+0x106/0x200 synproxy_send_client_synack_ipv6+0x1aa/0x1f0 nft_synproxy_do_eval+0x263/0x310 nft_do_chain+0x5a8/0x5f0 [nf_tables nft_do_chain_inet+0x98/0x110 nf_hook_slow+0x43/0xc0 __ip6_local_out+0xf0/0x170 ip6_local_out+0x17/0x70 synproxy_send_tcp_ipv6+0x1a2/0x200 synproxy_send_client_synack_ipv6+0x1aa/0x1f0 [...] Implement objref and objrefmap expression validate functions. Currently, only NFT_OBJECT_SYNPROXY object type requires validation. This will also handle a jump to a chain using a synproxy object from the OUTPUT hook. Now when trying to reference a synproxy object in the OUTPUT hook, nft will produce the following error: synproxy_crash.nft: Error: Could not process rule: Operation not supported synproxy name mysynproxy ^^^^^^^^^^^^^^^^^^^^^^^^
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-12
Last Modified
2025-11-14
Generated
2026-05-07
AI Q&A
2025-11-13
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by observing kernel crash logs indicating infinite recursive calls related to synproxy stateful objects in the OUTPUT hook. Specifically, kernel logs may show a stack guard page hit with call traces involving synproxy_send_tcp_ipv6 and nft_synproxy_do_eval functions. Additionally, attempting to apply nft rules referencing synproxy objects in the OUTPUT hook will produce an error: 'synproxy_crash.nft: Error: Could not process rule: Operation not supported'.


Can you explain this vulnerability to me?

This vulnerability in the Linux kernel's netfilter nft_objref component occurs when a synproxy stateful object is referenced from the OUTPUT hook, causing an infinite recursive call that leads to a kernel crash. The issue arises because the nft_objref and objrefmap expressions were not properly validated, allowing this problematic reference. The fix involves implementing validation functions for these expressions, specifically for the NFT_OBJECT_SYNPROXY type, which prevents the crash by disallowing unsupported operations referencing synproxy objects in the OUTPUT hook.


How can this vulnerability impact me? :

This vulnerability can cause the Linux kernel to crash due to infinite recursion when a synproxy object is referenced from the OUTPUT hook in netfilter rules. Such a kernel crash can lead to system instability, downtime, and potential loss of data or service availability, impacting systems that use nftables with synproxy objects in their firewall or network filtering configurations.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, avoid referencing synproxy stateful objects from the OUTPUT hook in nftables rules. Ensure that nft rules do not include synproxy objects in the OUTPUT chain to prevent kernel crashes. Applying kernel updates that include the fix for validating objref and objrefmap expressions related to synproxy objects is also recommended once available.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart