CVE-2025-21768: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels Some lwtunnels have a dst cache for post-transformation dst. If the packet destination did not change we may end up recording a reference to the lwtunnel in its own cache, and the lwtunnel state will never be freed. Discovered by the ioam6.sh test, kmemleak was recently fixed to catch per-cpu memory leaks. I'm not sure if rpl and seg6 can actually hit this, but in principle I don't see why not.
AI Analysis
Technical Summary
CVE-2025-21768 is a vulnerability identified in the Linux kernel's networking subsystem, specifically affecting the IPv6 Lightweight Tunnels (lwtunnels) implementation. The issue arises from the way certain lwtunnels maintain a destination (dst) cache for post-transformation destinations. When a packet's destination does not change after processing through the tunnel, the kernel may erroneously record a reference to the lwtunnel within its own cache. This creates a reference loop that prevents the lwtunnel state from being freed, leading to a memory leak. The vulnerability was discovered through the ioam6.sh test and was highlighted by improvements in kmemleak detection for per-CPU memory leaks. While the vulnerability explicitly affects the ioam6 lwtunnel, it is also suspected that other lwtunnels such as RPL (Routing Protocol for Low-Power and Lossy Networks) and SEG6 (Segment Routing over IPv6) could be impacted, although this has not been definitively confirmed. The root cause is a flaw in the kernel's handling of destination references within the IPv6 lwtunnel code, which can cause persistent memory consumption due to unreleased resources. This vulnerability does not appear to have known exploits in the wild at this time, and no CVSS score has been assigned yet. The affected versions correspond to a specific Linux kernel commit (6c8702c60b88651072460f3f4026c7dfe2521d12), indicating that the issue is present in recent kernel versions prior to the patch. The vulnerability primarily impacts systems utilizing IPv6 lwtunnels, which are often used in advanced networking scenarios such as network function virtualization, segment routing, and telemetry in IPv6 networks.
Potential Impact
For European organizations, the impact of CVE-2025-21768 depends largely on their use of Linux-based systems with IPv6 lwtunnels enabled, particularly in environments leveraging advanced IPv6 networking features like segment routing (SEG6) or in IoT and low-power network deployments using RPL. The memory leak caused by the vulnerability can lead to gradual resource exhaustion on affected systems, potentially resulting in degraded network performance, denial of service due to kernel memory depletion, or system instability. This can disrupt critical infrastructure, cloud services, telecommunications networks, and enterprise data centers that rely on Linux for routing and network virtualization. Given the increasing adoption of IPv6 in Europe and the use of Linux in telecom and cloud infrastructure, the vulnerability poses a risk to service availability and operational continuity. Although exploitation does not appear straightforward and no active exploits are known, the persistent nature of the memory leak means that long-running systems or those under heavy IPv6 traffic could be affected. This could lead to increased maintenance overhead and potential outages if unpatched. Confidentiality and integrity impacts are minimal as the vulnerability does not directly allow code execution or packet manipulation, but availability is at risk due to resource exhaustion.
Mitigation Recommendations
To mitigate CVE-2025-21768, European organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability as soon as they become available, ensuring that all systems running affected kernel versions are updated promptly. 2) Audit and monitor network configurations to identify the use of IPv6 lwtunnels, especially ioam6, RPL, and SEG6 tunnels, and assess whether these features are necessary for operational requirements. 3) Where feasible, disable unused or non-essential IPv6 lwtunnel features to reduce the attack surface. 4) Implement proactive monitoring of kernel memory usage and network subsystem metrics to detect abnormal memory growth indicative of leaks. 5) Employ automated system health checks and memory leak detection tools such as kmemleak to identify early signs of this vulnerability in production environments. 6) For critical infrastructure, consider network segmentation and redundancy to minimize the impact of potential service degradation. 7) Engage with Linux distribution vendors and maintain awareness of security advisories related to this vulnerability for timely updates. These steps go beyond generic advice by focusing on feature auditing, proactive monitoring, and operational controls specific to the affected kernel networking components.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark, Italy, Spain
CVE-2025-21768: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels Some lwtunnels have a dst cache for post-transformation dst. If the packet destination did not change we may end up recording a reference to the lwtunnel in its own cache, and the lwtunnel state will never be freed. Discovered by the ioam6.sh test, kmemleak was recently fixed to catch per-cpu memory leaks. I'm not sure if rpl and seg6 can actually hit this, but in principle I don't see why not.
AI-Powered Analysis
Technical Analysis
CVE-2025-21768 is a vulnerability identified in the Linux kernel's networking subsystem, specifically affecting the IPv6 Lightweight Tunnels (lwtunnels) implementation. The issue arises from the way certain lwtunnels maintain a destination (dst) cache for post-transformation destinations. When a packet's destination does not change after processing through the tunnel, the kernel may erroneously record a reference to the lwtunnel within its own cache. This creates a reference loop that prevents the lwtunnel state from being freed, leading to a memory leak. The vulnerability was discovered through the ioam6.sh test and was highlighted by improvements in kmemleak detection for per-CPU memory leaks. While the vulnerability explicitly affects the ioam6 lwtunnel, it is also suspected that other lwtunnels such as RPL (Routing Protocol for Low-Power and Lossy Networks) and SEG6 (Segment Routing over IPv6) could be impacted, although this has not been definitively confirmed. The root cause is a flaw in the kernel's handling of destination references within the IPv6 lwtunnel code, which can cause persistent memory consumption due to unreleased resources. This vulnerability does not appear to have known exploits in the wild at this time, and no CVSS score has been assigned yet. The affected versions correspond to a specific Linux kernel commit (6c8702c60b88651072460f3f4026c7dfe2521d12), indicating that the issue is present in recent kernel versions prior to the patch. The vulnerability primarily impacts systems utilizing IPv6 lwtunnels, which are often used in advanced networking scenarios such as network function virtualization, segment routing, and telemetry in IPv6 networks.
Potential Impact
For European organizations, the impact of CVE-2025-21768 depends largely on their use of Linux-based systems with IPv6 lwtunnels enabled, particularly in environments leveraging advanced IPv6 networking features like segment routing (SEG6) or in IoT and low-power network deployments using RPL. The memory leak caused by the vulnerability can lead to gradual resource exhaustion on affected systems, potentially resulting in degraded network performance, denial of service due to kernel memory depletion, or system instability. This can disrupt critical infrastructure, cloud services, telecommunications networks, and enterprise data centers that rely on Linux for routing and network virtualization. Given the increasing adoption of IPv6 in Europe and the use of Linux in telecom and cloud infrastructure, the vulnerability poses a risk to service availability and operational continuity. Although exploitation does not appear straightforward and no active exploits are known, the persistent nature of the memory leak means that long-running systems or those under heavy IPv6 traffic could be affected. This could lead to increased maintenance overhead and potential outages if unpatched. Confidentiality and integrity impacts are minimal as the vulnerability does not directly allow code execution or packet manipulation, but availability is at risk due to resource exhaustion.
Mitigation Recommendations
To mitigate CVE-2025-21768, European organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability as soon as they become available, ensuring that all systems running affected kernel versions are updated promptly. 2) Audit and monitor network configurations to identify the use of IPv6 lwtunnels, especially ioam6, RPL, and SEG6 tunnels, and assess whether these features are necessary for operational requirements. 3) Where feasible, disable unused or non-essential IPv6 lwtunnel features to reduce the attack surface. 4) Implement proactive monitoring of kernel memory usage and network subsystem metrics to detect abnormal memory growth indicative of leaks. 5) Employ automated system health checks and memory leak detection tools such as kmemleak to identify early signs of this vulnerability in production environments. 6) For critical infrastructure, consider network segmentation and redundancy to minimize the impact of potential service degradation. 7) Engage with Linux distribution vendors and maintain awareness of security advisories related to this vulnerability for timely updates. These steps go beyond generic advice by focusing on feature auditing, proactive monitoring, and operational controls specific to the affected kernel networking components.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.762Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9832c4522896dcbe8731
Added to database: 5/21/2025, 9:09:06 AM
Last enriched: 6/30/2025, 8:56:05 AM
Last updated: 7/26/2025, 4:02:40 PM
Views: 16
Related Threats
CVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.