We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-21629

net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets



Description

In the Linux kernel, the following vulnerability has been resolved: net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets The blamed commit disabled hardware offoad of IPv6 packets with extension headers on devices that advertise NETIF_F_IPV6_CSUM, based on the definition of that feature in skbuff.h: * * - %NETIF_F_IPV6_CSUM * - Driver (device) is only able to checksum plain * TCP or UDP packets over IPv6. These are specifically * unencapsulated packets of the form IPv6|TCP or * IPv6|UDP where the Next Header field in the IPv6 * header is either TCP or UDP. IPv6 extension headers * are not supported with this feature. This feature * cannot be set in features for a device with * NETIF_F_HW_CSUM also set. This feature is being * DEPRECATED (see below). The change causes skb_warn_bad_offload to fire for BIG TCP packets. [ 496.310233] WARNING: CPU: 13 PID: 23472 at net/core/dev.c:3129 skb_warn_bad_offload+0xc4/0xe0 [ 496.310297] ? skb_warn_bad_offload+0xc4/0xe0 [ 496.310300] skb_checksum_help+0x129/0x1f0 [ 496.310303] skb_csum_hwoffload_help+0x150/0x1b0 [ 496.310306] validate_xmit_skb+0x159/0x270 [ 496.310309] validate_xmit_skb_list+0x41/0x70 [ 496.310312] sch_direct_xmit+0x5c/0x250 [ 496.310317] __qdisc_run+0x388/0x620 BIG TCP introduced an IPV6_TLV_JUMBO IPv6 extension header to communicate packet length, as this is an IPv6 jumbogram. But, the feature is only enabled on devices that support BIG TCP TSO. The header is only present for PF_PACKET taps like tcpdump, and not transmitted by physical devices. For this specific case of extension headers that are not transmitted, return to the situation before the blamed commit and support hardware offload. ipv6_has_hopopt_jumbo() tests not only whether this header is present, but also that it is the only extension header before a terminal (L4) header.

Reserved 2024-12-29 | Published 2025-01-15 | Updated 2025-01-20 | Assigner Linux

Product status

Default status
unaffected

a84978a9cda68f0afe3f01d476c68db21526baf1 before ac9cfef69565021c9e1022a493a9c40b03e2caf9
affected

c69bc67c1cb211aa390bea6e512bb01b1241fefb before 95ccf006bbc8b59044313b8c309dcf29c546abd4
affected

04c20a9356f283da623903e81e7c6d5df7e4dc3c before d3b7a9c7597b779039a51d7b34116fbe424bf2b7
affected

04c20a9356f283da623903e81e7c6d5df7e4dc3c before 68e068cabd2c6c533ef934c2e5151609cf6ecc6d
affected

Default status
affected

6.12
affected

Any version before 6.12
unaffected

6.1.124
unaffected

6.6.70
unaffected

6.12.9
unaffected

6.13
unaffected

References

git.kernel.org/...c/ac9cfef69565021c9e1022a493a9c40b03e2caf9

git.kernel.org/...c/95ccf006bbc8b59044313b8c309dcf29c546abd4

git.kernel.org/...c/d3b7a9c7597b779039a51d7b34116fbe424bf2b7

git.kernel.org/...c/68e068cabd2c6c533ef934c2e5151609cf6ecc6d

cve.org (CVE-2025-21629)

nvd.nist.gov (CVE-2025-21629)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2025-21629

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.

MonTueWedThuFriSatSun
242526272812345678910111213141516171819202122232425262728293031123456
MonTueWedThuFriSatSun
242526272812345678910111213141516171819202122232425262728293031123456