CVE-2024-56703
Linux Kernel vulnerability analysis and mitigation

Overview

A vulnerability in the Linux kernel's IPv6 routing functionality has been discovered, identified as CVE-2024-56703. The issue affects the fib6selectpath function under conditions of high next hop churn. The vulnerability was discovered in December 2024 and affects Linux kernel versions from 4.15 through 6.12.2, with fixes being implemented in subsequent releases (NVD).

Technical details

The vulnerability manifests as soft lockups during the traversal of the multipath circular linked-list in the fib6_select_path function, specifically while iterating through siblings in the list. The issue occurs when nodes of the linked list are unexpectedly deleted concurrently on a different core, indicated by their 'next' and 'previous' elements pointing back to the node itself and their reference count dropping to zero. This results in an infinite loop, leading to a soft lockup that triggers a system panic via the watchdog timer. The vulnerability has been assigned a CVSS v3.1 Base Score of 5.5 (MEDIUM) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

The vulnerability can cause system instability and denial of service through kernel soft lockups, particularly affecting Linux-based edge routers in highly dynamic environments. When exploited, it can trigger a system panic via the watchdog timer, disrupting normal system operations (Kernel Patch).

Mitigation and workarounds

The issue has been resolved by applying RCU primitives in the problematic code sections and updating the references to fib6_siblings to use RCU APIs. The fix has been implemented in various kernel versions through patches. Users should update to patched versions: beyond 6.12.2 for the 6.12 series, beyond 6.11.11 for the 6.7-6.11 series, beyond 6.6.75 for the 6.2-6.6 series, or beyond 6.1.128 for the 4.15-6.1 series (NVD).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40205HIGH7.8
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesNov 12, 2025
CVE-2025-40211HIGH7.1
  • Linux KernelLinux Kernel
  • linux-gcp-5.15
NoYesNov 21, 2025
CVE-2025-40206MEDIUM5.5
  • Linux KernelLinux Kernel
  • linux-raspi
NoYesNov 12, 2025
CVE-2025-40210MEDIUM5.1
  • Linux KernelLinux Kernel
  • linux-realtime
NoYesNov 21, 2025
CVE-2025-40212N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-64k-modules
NoYesNov 24, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management