CVE-2025-71146
📋 TL;DR
This Linux kernel vulnerability in the netfilter connection tracking subsystem can cause connection tracking entries to be leaked when error conditions occur. This affects all Linux systems using netfilter (including iptables/nftables) for firewall or NAT functionality. The leaked connections can lead to resource exhaustion and system instability.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Resource exhaustion leading to kernel panic or denial of service, potentially causing system crashes and service disruption.
Likely Case
Gradual memory/connection table exhaustion causing degraded network performance, connection failures, and potential system instability.
If Mitigated
Minimal impact with proper monitoring and resource limits in place, though still represents a resource leak.
🎯 Exploit Status
Exploitation requires triggering specific error conditions in netfilter connection tracking, which may require network traffic manipulation
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits: 08fa37f4c8c59c294e9c18fea2d083ee94074e5a, 0b88be7211d21a0d68bb1e56dc805944e3654d6f, 2e2a720766886190a6d35c116794693aabd332b6, 325eb61bb30790ea27782203a17b007ce1754a67, 4bd2b89f4028f250dd1c1625eb3da1979b04a5e8
Vendor Advisory: https://git.kernel.org/stable/c/08fa37f4c8c59c294e9c18fea2d083ee94074e5a
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Limit connection tracking table size
linuxReduce maximum connection tracking entries to limit impact of potential leaks
sysctl -w net.netfilter.nf_conntrack_max=65536
sysctl -w net.netfilter.nf_conntrack_buckets=16384
Monitor connection tracking usage
linuxImplement monitoring to detect abnormal connection tracking growth
watch -n 60 'cat /proc/sys/net/netfilter/nf_conntrack_count'
🧯 If You Can't Patch
- Implement aggressive monitoring of connection tracking table usage and set up alerts for abnormal growth
- Consider implementing rate limiting or traffic filtering to reduce load on connection tracking subsystem
🔍 How to Verify
Check if Vulnerable:
Check if kernel version is before the patched commits. Use: uname -r and compare with distribution's patched kernel versions.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version after update matches patched version from your distribution. Check for presence of the fix commits in kernel source.
📡 Detection & Monitoring
Log Indicators:
- Kernel logs showing connection tracking table full errors
- System logs showing memory pressure or OOM conditions
Network Indicators:
- Increasing connection failures over time
- Degraded network performance
SIEM Query:
source="kernel" AND ("nf_conntrack" OR "connection tracking") AND ("full" OR "error" OR "leak")
🔗 References
- https://git.kernel.org/stable/c/08fa37f4c8c59c294e9c18fea2d083ee94074e5a
- https://git.kernel.org/stable/c/0b88be7211d21a0d68bb1e56dc805944e3654d6f
- https://git.kernel.org/stable/c/2e2a720766886190a6d35c116794693aabd332b6
- https://git.kernel.org/stable/c/325eb61bb30790ea27782203a17b007ce1754a67
- https://git.kernel.org/stable/c/4bd2b89f4028f250dd1c1625eb3da1979b04a5e8
- https://git.kernel.org/stable/c/e1ac8dce3a893641bef224ad057932f142b8a36f
- https://git.kernel.org/stable/c/f381a33f34dda9e4023e38ba68c943bca83245e9