netfilter: ipset: fix region locking in hash types
Region locking introduced in v5.6-rc4 contained three macros to handle
the region locks: ahash_bucket_start(), ahash_bucket_end() which gave
back the start and end hash bucket values belonging to a given region
lock and ahash_region() which should give back the region lock belonging
to a given hash bucket. The latter was incorrect which can lead to a
race condition between the garbage collector and adding new elements
when a hash type of set is defined with timeouts.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4271-1 | linux-6.1 security update |
Debian DLA |
DLA-4327-1 | linux security update |
EUVD |
EUVD-2025-16383 | In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: fix region locking in hash types Region locking introduced in v5.6-rc4 contained three macros to handle the region locks: ahash_bucket_start(), ahash_bucket_end() which gave back the start and end hash bucket values belonging to a given region lock and ahash_region() which should give back the region lock belonging to a given hash bucket. The latter was incorrect which can lead to a race condition between the garbage collector and adding new elements when a hash type of set is defined with timeouts. |
Ubuntu USN |
USN-7608-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7608-2 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-7608-3 | Linux kernel (Real-time) vulnerabilities |
Ubuntu USN |
USN-7608-4 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7608-5 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7608-6 | Linux kernel (Xilinx ZynqMP) vulnerabilities |
Ubuntu USN |
USN-7608-7 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7609-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7609-2 | Linux kernel (Real-time) vulnerabilities |
Ubuntu USN |
USN-7609-3 | Linux kernel (IBM) vulnerabilities |
Ubuntu USN |
USN-7609-4 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7609-5 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7610-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7610-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7610-3 | Linux kernel (Low Latency) vulnerabilities |
Ubuntu USN |
USN-7611-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7611-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7611-3 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-7611-4 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7618-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-7628-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7653-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-7655-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-7665-2 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-7671-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7671-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7671-3 | Linux kernel (IoT) vulnerabilities |
Ubuntu USN |
USN-7686-1 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-7712-1 | Linux kernel (Azure FIPS) vulnerabilities |
Ubuntu USN |
USN-7712-2 | Linux kernel (Azure) vulnerabilities |
Tue, 16 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Debian
Debian debian Linux |
|
| Weaknesses | CWE-667 | |
| CPEs | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.6:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.6:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.6:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.6:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.6:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:* |
|
| Vendors & Products |
Debian
Debian debian Linux |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 03 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 04 Jun 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 30 May 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 29 May 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: fix region locking in hash types Region locking introduced in v5.6-rc4 contained three macros to handle the region locks: ahash_bucket_start(), ahash_bucket_end() which gave back the start and end hash bucket values belonging to a given region lock and ahash_region() which should give back the region lock belonging to a given hash bucket. The latter was incorrect which can lead to a race condition between the garbage collector and adding new elements when a hash type of set is defined with timeouts. | |
| Title | netfilter: ipset: fix region locking in hash types | |
| References |
|
|
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2026-05-11T21:19:18.950Z
Reserved: 2025-04-16T04:51:23.976Z
Link: CVE-2025-37997
No data.
Status : Analyzed
Published: 2025-05-29T14:15:36.317
Modified: 2025-12-16T20:20:41.413
Link: CVE-2025-37997
OpenCVE Enrichment
Updated: 2025-06-24T09:44:22Z
Debian DLA
EUVD
Ubuntu USN