First published: Tue Apr 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net: mctp: unshare packets when reassembling Ensure that the frag_list used for reassembly isn't shared with other packets. This avoids incorrect reassembly when packets are cloned, and prevents a memory leak due to circular references between fragments and their skb_shared_info. The upcoming MCTP-over-USB driver uses skb_clone which can trigger the problem - other MCTP drivers don't share SKBs. A kunit test is added to reproduce the issue.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21972 has been classified as high severity due to the potential for incorrect packet reassembly and memory leaks.
To fix CVE-2025-21972, update to the latest version of the Linux Kernel where the vulnerability has been resolved.
CVE-2025-21972 affects multiple versions of the Linux Kernel prior to the patch that resolves the vulnerability.
The impact of CVE-2025-21972 includes the risk of data corruption due to improper packet reassembly and potential denial of service through memory leakage.
Yes, CVE-2025-21972 is a network security vulnerability related to packet handling in the Linux kernel.