VYPR
Unrated severityNVD Advisory· Published Nov 12, 2025· Updated Apr 15, 2026

CVE-2025-40173

CVE-2025-40173

Description

In the Linux kernel, the following vulnerability has been resolved:

net/ip6_tunnel: Prevent perpetual tunnel growth

Similarly to ipv4 tunnel, ipv6 version updates dev->needed_headroom, too. While ipv4 tunnel headroom adjustment growth was limited in commit 5ae1e9922bbd ("net: ip_tunnel: prevent perpetual headroom growth"), ipv6 tunnel yet increases the headroom without any ceiling.

Reflect ipv4 tunnel headroom adjustment limit on ipv6 version.

Credits to Francesco Ruggeri, who was originally debugging this issue and wrote local Arista-specific patch and a reproducer.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, ip6_tunnel lacks a ceiling on needed_headroom, allowing perpetual growth and potential resource exhaustion.

Vulnerability

Description

CVE-2025-40173 is a vulnerability in the Linux kernel's IPv6 tunnel implementation (net/ip6_tunnel). Similar to a previously fixed issue in IPv4 tunnels (commit 5ae1e9922bbd), the IPv6 version updates dev->needed_headroom without any limit, leading to perpetual headroom growth [1]. This unbounded growth can exhaust kernel memory or degrade network performance, resulting in a denial-of-service condition.

Exploitation

The vulnerability is triggered by repeatedly creating or reconfiguring IPv6 tunnels, which causes ip6_tnl_change to increase the headroom requirement without bound [2]. No special privileges are required beyond the ability to create or modify network tunnels (typically CAP_NET_ADMIN). An attacker with local access can exploit this to cause resource exhaustion.

Impact

Successful exploitation leads to continuous headroom expansion, potentially exhausting system memory or causing network stack failures. This can result in denial of service for the affected system and its network services.

Mitigation

The fix limits the headroom increase, mirroring the IPv4 tunnel fix [3]. Patches have been applied to the Linux kernel stable branches [4]. Users should update to the latest stable kernel to prevent exploitation.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.