CVE-2025-22005

Source
https://cve.org/CVERecord?id=CVE-2025-22005
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-22005.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-22005
Downstream
Related
Published
2025-04-03T07:19:06.716Z
Modified
2026-03-20T12:41:16.623425Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw().
Details

In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix memleak of nhcpcpurthoutput in fibchecknhv6_gw().

fibchecknhv6gw() expects that fib6nhinit() cleans up everything when it fails.

Commit 7dd73168e273 ("ipv6: Always allocate pcpu memory in a fib6nh") moved fibnhcommoninit() before allocpercpugfp() within fib6nhinit() but forgot to add cleanup for fib6nh->nhcommon.nhcpcpurthoutput in case it fails to allocate fib6nh->rt6i_pcpu, resulting in memleak.

Let's call fibnhcommonrelease() and clear nhcpcpurthoutput in the error path.

Note that we can remove the fib6nhrelease() call in nhcreateipv6() later in net-next.git.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22005.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7dd73168e273938b9e9bb42ca51b0c27d807992b
Fixed
16267a5036173d0173377545b4b6021b081d0933
Fixed
1bd12dfc058e1e68759d313d7727d68dbc1b8964
Fixed
596a883c4ce2d2e9c175f25b98fed3a1f33fea38
Fixed
77c41cdbe6bce476e08d3251c0d501feaf10a9f3
Fixed
119dcafe36795a15ae53351cbbd6177aaf94ffef
Fixed
29d91820184d5cbc70f3246d4911d96eaeb930d6
Fixed
d3d5b4b5ae263c3225db363ba08b937e2e2b0380
Fixed
9740890ee20e01f99ff1dde84c63dcf089fabb98

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-22005.json"