CVE-2025-71097
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
13/01/2026
Última modificación:
13/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ipv4: Fix reference count leak when using error routes with nexthop objects<br />
<br />
When a nexthop object is deleted, it is marked as dead and then<br />
fib_table_flush() is called to flush all the routes that are using the<br />
dead nexthop.<br />
<br />
The current logic in fib_table_flush() is to only flush error routes<br />
(e.g., blackhole) when it is called as part of network namespace<br />
dismantle (i.e., with flush_all=true). Therefore, error routes are not<br />
flushed when their nexthop object is deleted:<br />
<br />
# ip link add name dummy1 up type dummy<br />
# ip nexthop add id 1 dev dummy1<br />
# ip route add 198.51.100.1/32 nhid 1<br />
# ip route add blackhole 198.51.100.2/32 nhid 1<br />
# ip nexthop del id 1<br />
# ip route show<br />
blackhole 198.51.100.2 nhid 1 dev dummy1<br />
<br />
As such, they keep holding a reference on the nexthop object which in<br />
turn holds a reference on the nexthop device, resulting in a reference<br />
count leak:<br />
<br />
# ip link del dev dummy1<br />
[ 70.516258] unregister_netdevice: waiting for dummy1 to become free. Usage count = 2<br />
<br />
Fix by flushing error routes when their nexthop is marked as dead.<br />
<br />
IPv6 does not suffer from this problem.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/30386e090c49e803c0616a7147e43409c32a2b0e
- https://git.kernel.org/stable/c/5979338c83012110ccd45cae6517591770bfe536
- https://git.kernel.org/stable/c/ac782f4e3bfcde145b8a7f8af31d9422d94d172a
- https://git.kernel.org/stable/c/e3fc381320d04e4a74311e576a86cac49a16fc43
- https://git.kernel.org/stable/c/ee4183501ea556dca31f5ffd8690aa9fd25b609f



