Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2025-68340

Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
23/12/2025
Última modificación:
26/02/2026

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> team: Move team device type change at the end of team_port_add<br /> <br /> Attempting to add a port device that is already up will expectedly fail,<br /> but not before modifying the team device header_ops.<br /> <br /> In the case of the syzbot reproducer the gre0 device is<br /> already in state UP when it attempts to add it as a<br /> port device of team0, this fails but before that<br /> header_ops-&gt;create of team0 is changed from eth_header to ipgre_header<br /> in the call to team_dev_type_check_change.<br /> <br /> Later when we end up in ipgre_header() struct ip_tunnel* points to nonsense<br /> as the private data of the device still holds a struct team.<br /> <br /> Example sequence of iproute2 commands to reproduce the hang/BUG():<br /> ip link add dev team0 type team<br /> ip link add dev gre0 type gre<br /> ip link set dev gre0 up<br /> ip link set dev gre0 master team0<br /> ip link set dev team0 up<br /> ping -I team0 1.1.1.1<br /> <br /> Move team_dev_type_check_change down where all other checks have passed<br /> as it changes the dev type with no way to restore it in case<br /> one of the checks that follow it fail.<br /> <br /> Also make sure to preserve the origial mtu assignment:<br /> - If port_dev is not the same type as dev, dev takes mtu from port_dev<br /> - If port_dev is the same type as dev, port_dev takes mtu from dev<br /> <br /> This is done by adding a conditional before the call to dev_set_mtu<br /> to prevent it from assigning port_dev-&gt;mtu = dev-&gt;mtu and instead<br /> letting team_dev_type_check_change assign dev-&gt;mtu = port_dev-&gt;mtu.<br /> The conditional is needed because the patch moves the call to<br /> team_dev_type_check_change past dev_set_mtu.<br /> <br /> Testing:<br /> - team device driver in-tree selftests<br /> - Add/remove various devices as slaves of team device<br /> - syzbot

Productos y versiones vulnerables

CPE Desde Hasta
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.7 (incluyendo) 5.15.199 (excluyendo)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (incluyendo) 6.1.162 (excluyendo)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (incluyendo) 6.6.123 (excluyendo)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (incluyendo) 6.12.61 (excluyendo)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (incluyendo) 6.17.11 (excluyendo)
cpe:2.3:o:linux:linux_kernel:6.18:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc7:*:*:*:*:*:*