CVE-2025-40215
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of ipcomp fallback tunnels in the xfrm subsystem. When the last user state that depends on a fallback tunnel is destroyed, the fallback tunnel itself is not properly deleted if references to the user state still exist. This causes the fallback state to remain in kernel lists and hashtables, triggering warnings and potentially leading to resource management issues. The problem arises because some network buffers (skbs) holding security paths (secpath) may remain queued during network namespace destruction, preventing timely deletion of fallback states. The fix ensures that fallback states are deleted as soon as the last dependent user state is deleted, improving cleanup and preventing lingering references.
How can this vulnerability impact me? :
This vulnerability can lead to improper cleanup of fallback tunnel states in the Linux kernel, which may cause warnings, resource leaks, or instability in the networking subsystem. While it does not directly indicate a security breach, lingering references and delayed deletion of states could potentially affect system reliability and performance, especially in environments heavily using IPsec or related tunneling features.