VYPR
Unrated severityNVD Advisory· Published Oct 24, 2025· Updated Apr 15, 2026

CVE-2025-40018

CVE-2025-40018

Description

In the Linux kernel, the following vulnerability has been resolved:

ipvs: Defer ip_vs_ftp unregister during netns cleanup

On the netns cleanup path, __ip_vs_ftp_exit() may unregister ip_vs_ftp before connections with valid cp->app pointers are flushed, leading to a use-after-free.

Fix this by introducing a global exiting_module flag, set to true in ip_vs_ftp_exit() before unregistering the pernet subsystem. In __ip_vs_ftp_exit(), skip ip_vs_ftp unregister if called during netns cleanup (when exiting_module is false) and defer it to __ip_vs_cleanup_batch(), which unregisters all apps after all connections are flushed. If called during module exit, unregister ip_vs_ftp immediately.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free in Linux kernel IPVS FTP helper due to premature unregistration during netns cleanup; fixed by deferring unregister until after connections are flushed.

Vulnerability

In the Linux kernel's IPVS subsystem, the ip_vs_ftp helper module could be unregistered during network namespace (netns) cleanup before all connections with valid cp->app pointers were flushed. This ordering issue led to a use-after-free condition when the connection cleanup code later attempted to access the already-freed app structure [1].

Exploitation

The vulnerability is triggered on the netns cleanup path. When a netns is being torn down, __ip_vs_ftp_exit() may call the unregister function for ip_vs_ftp while active connections still reference the helper. No special privileges are required beyond the ability to trigger netns cleanup (e.g., by removing a network namespace), and the attack surface is local to the kernel [1].

Impact

An attacker who can trigger netns cleanup while ip_vs_ftp connections are active could cause a use-after-free, potentially leading to memory corruption, system crash (denial of service), or possibly privilege escalation. The issue is classified as a high-severity memory safety bug [1].

Mitigation

The fix introduces a global exiting_module flag. During module exit, ip_vs_ftp is unregistered immediately; during netns cleanup, the unregister is deferred to __ip_vs_cleanup_batch(), which runs after all connections are flushed. The patch has been applied to the stable kernel tree [1][2][3]. Users should update to a patched kernel version.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.