CVE-2025-38721

Source
https://cve.org/CVERecord?id=CVE-2025-38721
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38721.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-38721
Downstream
Related
Published
2025-09-04T15:33:14.891Z
Modified
2026-03-23T05:10:37.040772204Z
Summary
netfilter: ctnetlink: fix refcount leak on table dump
Details

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: fix refcount leak on table dump

There is a reference count leak in ctnetlinkdumptable(): if (res < 0) { nfconntrackget(&ct->ct_general); // HERE cb->args[1] = (unsigned long)ct; ...

While its very unlikely, its possible that ct == last. If this happens, then the refcount of ct was already incremented. This 2nd increment is never undone.

This prevents the conntrack object from being released, which in turn keeps prevents cnet->count from dropping back to 0.

This will then block the netns dismantle (or conntrack rmmod) as nfconntrackcleanupnetlist() will wait forever.

This can be reproduced by running conntrackresize.sh selftest in a loop. It takes ~20 minutes for me on a preemptible kernel on average before I see a runaway kworker spinning in nfconntrackcleanupnet_list.

One fix would to change this to: if (res < 0) { if (ct != last) nfconntrackget(&ct->ct_general);

But this reference counting isn't needed in the first place. We can just store a cookie value instead.

A followup patch will do the same for ctnetlinkexpdumptable, it looks to me as if this has the same problem and like ctnetlinkdump_table, we only need a 'skip hint', not the actual object so we can apply the same cookie strategy there as well.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38721.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d205dc40798d97d63ad348bfaf7394f445d152d4
Fixed
586892e341fbf698e7cbaca293e1353957db725a
Fixed
962518c6ca9f9a13df099cafa429f72f68ad61f0
Fixed
19b909a4b1452fb97e477d2f08b97f8d04095619
Fixed
41462f4cfc583513833f87f9ee55d12da651a7e3
Fixed
30cf811058552b8cd0e98dff677ef3f89d6d34ce
Fixed
a2cb4df7872de069f809de2f076ec8e54d649fe3
Fixed
e14f72aa66c029db106921d621edcedef68e065b
Fixed
a62d6aa3f31f216b637a4c71b7a8bfc7c57f049b
Fixed
de788b2e6227462b6dcd0e07474e72c089008f74

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38721.json"