Upstream information

CVE-2025-71152 at MITRE

Description

In the Linux kernel, the following vulnerability has been resolved:

net: dsa: properly keep track of conduit reference

Problem description
-------------------

DSA has a mumbo-jumbo of reference handling of the conduit net device
and its kobject which, sadly, is just wrong and doesn't make sense.

There are two distinct problems.

1. The OF path, which uses of_find_net_device_by_node(), never releases
the elevated refcount on the conduit's kobject. Nominally, the OF and
non-OF paths should result in objects having identical reference
counts taken, and it is already suspicious that
dsa_dev_to_net_device() has a put_device() call which is missing in
dsa_port_parse_of(), but we can actually even verify that an issue
exists. With CONFIG_DEBUG_KOBJECT_RELEASE=y, if we run this command
"before" and "after" applying this patch:

(unbind the conduit driver for net device eno2)
echo 0000:00:00.2 > /sys/bus/pci/drivers/fsl_enetc/unbind

we see these lines in the output diff which appear only with the patch
applied:

kobject: 'eno2' (ffff002009a3a6b8): kobject_release, parent 0000000000000000 (delayed 1000)
kobject: '109' (ffff0020099d59a0): kobject_release, parent 0000000000000000 (delayed 1000)

2. After we find the conduit interface one way (OF) or another (non-OF),
it can get unregistered at any time, and DSA remains with a long-lived,
but in this case stale, cpu_dp->conduit pointer. Holding the net
device's underlying kobject isn't actually of much help, it just
prevents it from being freed (but we never need that kobject
directly). What helps us to prevent the net device from being
unregistered is the parallel netdev reference mechanism (dev_hold()
and dev_put()).

Actually we actually use that netdev tracker mechanism implicitly on
user ports since commit 2f1e8ea726e9 ("net: dsa: link interfaces with
the DSA master to get rid of lockdep warnings"), via netdev_upper_dev_link().
But time still passes at DSA switch probe time between the initial
of_find_net_device_by_node() code and the user port creation time, time
during which the conduit could unregister itself and DSA wouldn't know
about it.

So we have to run of_find_net_device_by_node() under rtnl_lock() to
prevent that from happening, and release the lock only with the netdev
tracker having acquired the reference.

Do we need to keep the reference until dsa_unregister_switch() /
dsa_switch_shutdown()?
1: Maybe yes. A switch device will still be registered even if all user
ports failed to probe, see commit 86f8b1c01a0a ("net: dsa: Do not
make user port errors fatal"), and the cpu_dp->conduit pointers
remain valid. I haven't audited all call paths to see whether they
will actually use the conduit in lack of any user port, but if they
do, it seems safer to not rely on user ports for that reference.
2. Definitely yes. We support changing the conduit which a user port is
associated to, and we can get into a situation where we've moved all
user ports away from a conduit, thus no longer hold any reference to
it via the net device tracker. But we shouldn't let it go nonetheless
- see the next change in relation to dsa_tree_find_first_conduit()
and LAG conduits which disappear.
We have to be prepared to return to the physical conduit, so the CPU
port must explicitly keep another reference to it. This is also to
say: the user ports and their CPU ports may not always keep a
reference to the same conduit net device, and both are needed.

As for the conduit's kobject for the /sys/class/net/ entry, we don't
care about it, we can release it as soon as we hold the net device
object itself.

History and blame attribution
-----------------------------

The code has been refactored so many times, it is very difficult to
follow and properly attribute a blame, but I'll try to make a short
history which I hope to be correct.

We have two distinct probing paths:
- one for OF, introduced in 2016 i
---truncated---

SUSE information

Overall state of this security issue: Pending

This issue is currently rated as having moderate severity.

CVSS v3 Scores
CVSS detail SUSE
Base Score 6.3
Vector CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
Attack Vector Local
Attack Complexity High
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact High
Availability Impact High
CVSSv3 Version 3.1
CVSS v4 Scores
CVSS detail SUSE
Base Score 5.8
Vector CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
Attack Vector Local
Attack Complexity High
Attack Requirements None
Privileges Required Low
User Interaction None
Vulnerable System Confidentiality Impact None
Vulnerable System Integrity Impact High
Vulnerable System Availability Impact High
Subsequent System Confidentiality Impact None
Subsequent System Integrity Impact None
Subsequent System Availability Impact None
CVSSv4 Version 4.0

Note from the SUSE Security Team on the kernel-default package

SUSE will no longer fix all CVEs in the Linux Kernel anymore, but declare some bug classes as won't fix. Please refer to TID 21496 for more details.

SUSE Bugzilla entry: 1257161 [NEW]

No SUSE Security Announcements cross referenced.


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification. The updates are grouped by state of their lifecycle. SUSE product lifecycles are documented on the lifecycle page.

Product(s) Source package State
Products under general support and receiving all security fixes.
SUSE Linux Enterprise Desktop 15 SP7 kernel-default Affected
SUSE Linux Enterprise Desktop 15 SP7 kernel-source Affected
SUSE Linux Enterprise High Availability Extension 15 SP7 kernel-default Affected
SUSE Linux Enterprise High Availability Extension 15 SP7 kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP7 kernel-default Affected
SUSE Linux Enterprise High Performance Computing 15 SP7 kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP7 kernel-source-azure Affected
SUSE Linux Enterprise Live Patching 15 SP7 kernel-default Affected
SUSE Linux Enterprise Live Patching 15 SP7 kernel-source Affected
SUSE Linux Enterprise Micro 5.2 kernel-default Affected
SUSE Linux Enterprise Micro 5.2 kernel-rt Affected
SUSE Linux Enterprise Micro 5.2 kernel-source Affected
SUSE Linux Enterprise Micro 5.2 kernel-source-rt Affected
SUSE Linux Enterprise Micro 5.3 kernel-default Affected
SUSE Linux Enterprise Micro 5.3 kernel-rt Affected
SUSE Linux Enterprise Micro 5.3 kernel-source Affected
SUSE Linux Enterprise Micro 5.3 kernel-source-rt Affected
SUSE Linux Enterprise Micro 5.4 kernel-default Affected
SUSE Linux Enterprise Micro 5.4 kernel-rt Affected
SUSE Linux Enterprise Micro 5.4 kernel-source Affected
SUSE Linux Enterprise Micro 5.4 kernel-source-rt Affected
SUSE Linux Enterprise Micro 5.5 kernel-default Affected
SUSE Linux Enterprise Micro 5.5 kernel-source Affected
SUSE Linux Enterprise Micro 5.5 kernel-source-rt Affected
SUSE Linux Enterprise Module for Basesystem 15 SP7 kernel-default Affected
SUSE Linux Enterprise Module for Basesystem 15 SP7 kernel-source Affected
SUSE Linux Enterprise Module for Development Tools 15 SP7 kernel-default Affected
SUSE Linux Enterprise Module for Development Tools 15 SP7 kernel-source Affected
SUSE Linux Enterprise Module for Legacy 15 SP7 kernel-default Affected
SUSE Linux Enterprise Module for Legacy 15 SP7 kernel-source Affected
SUSE Linux Enterprise Module for Public Cloud 15 SP7 kernel-source-azure Affected
SUSE Linux Enterprise Real Time 15 SP7 kernel-source-rt Affected
SUSE Linux Enterprise Server 15 SP7 kernel-default Affected
SUSE Linux Enterprise Server 15 SP7 kernel-source Affected
SUSE Linux Enterprise Server 15 SP7 kernel-source-azure Affected
SUSE Linux Enterprise Server 16.0 kernel-default Affected
SUSE Linux Enterprise Server 16.0 kernel-source Affected
SUSE Linux Enterprise Server 16.0 kernel-source-azure Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP7 kernel-default Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP7 kernel-source Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP7 kernel-source-azure Affected
SUSE Linux Enterprise Server for SAP applications 16.0 kernel-default Affected
SUSE Linux Enterprise Server for SAP applications 16.0 kernel-source Affected
SUSE Linux Enterprise Server for SAP applications 16.0 kernel-source-azure Affected
SUSE Linux Enterprise Workstation Extension 15 SP7 kernel-default Affected
SUSE Linux Enterprise Workstation Extension 15 SP7 kernel-source Affected
SUSE Linux Micro 6.0 kernel-default Affected
SUSE Linux Micro 6.0 kernel-source Affected
SUSE Linux Micro 6.0 kernel-source-rt Affected
SUSE Linux Micro 6.1 kernel-default Affected
SUSE Linux Micro 6.1 kernel-source Affected
SUSE Linux Micro 6.1 kernel-source-rt Affected
SUSE Linux Micro 6.2 kernel-source Affected
SUSE Real Time Module 15 SP7 kernel-source-rt Affected
openSUSE Leap 15.6 kernel-default Affected
openSUSE Leap 15.6 kernel-source Affected
openSUSE Leap 15.6 kernel-source-azure Unsupported
openSUSE Leap 15.6 kernel-source-rt Unsupported
Products under Long Term Service Pack support and receiving important and critical security fixes.
SUSE Linux Enterprise High Performance Computing 15 SP4 kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS kernel-default Affected
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP5 kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS kernel-default Affected
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS kernel-source Affected
SUSE Linux Enterprise Live Patching 12 SP5 kernel-default Affected
SUSE Linux Enterprise Live Patching 12 SP5 kernel-source Affected
SUSE Linux Enterprise Live Patching 15 SP4 kernel-default Affected
SUSE Linux Enterprise Live Patching 15 SP4 kernel-source Affected
SUSE Linux Enterprise Live Patching 15 SP5 kernel-default Affected
SUSE Linux Enterprise Live Patching 15 SP5 kernel-source Affected
SUSE Linux Enterprise Module for Basesystem 15 SP4 kernel-source Affected
SUSE Linux Enterprise Module for Basesystem 15 SP5 kernel-source Affected
SUSE Linux Enterprise Module for Basesystem 15 SP6 kernel-source Affected
SUSE Linux Enterprise Module for Development Tools 15 SP4 kernel-source Affected
SUSE Linux Enterprise Module for Development Tools 15 SP5 kernel-source Affected
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE kernel-default Not affected
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE kernel-source Not affected
SUSE Linux Enterprise Server 12 SP5 kernel-source Affected
SUSE Linux Enterprise Server 12 SP5-LTSS kernel-default Affected
SUSE Linux Enterprise Server 12 SP5-LTSS kernel-source Affected
SUSE Linux Enterprise Server 12 SP5-LTSS Extended Security kernel-default Affected
SUSE Linux Enterprise Server 12 SP5-LTSS Extended Security kernel-source Affected
SUSE Linux Enterprise Server 15 SP4 kernel-source Affected
SUSE Linux Enterprise Server 15 SP4-LTSS kernel-default Affected
SUSE Linux Enterprise Server 15 SP4-LTSS kernel-source Affected
SUSE Linux Enterprise Server 15 SP5 kernel-source Affected
SUSE Linux Enterprise Server 15 SP5-LTSS kernel-default Affected
SUSE Linux Enterprise Server 15 SP5-LTSS kernel-source Affected
SUSE Linux Enterprise Server 15 SP6-LTSS kernel-default Affected
SUSE Linux Enterprise Server 15 SP6-LTSS kernel-source Affected
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5 kernel-source Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP6 kernel-default Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP6 kernel-source Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP6 kernel-source-azure Unsupported
SUSE Manager Proxy 4.3 kernel-source Affected
SUSE Manager Proxy LTS 4.3 kernel-source Affected
SUSE Manager Retail Branch Server 4.3 kernel-source Affected
SUSE Manager Retail Branch Server LTS 4.3 kernel-source Affected
SUSE Manager Server 4.3 kernel-source Affected
SUSE Manager Server LTS 4.3 kernel-source Affected
Products past their end of life and not receiving proactive updates anymore.
SUSE CaaS Platform 4.0 kernel-source Affected
SUSE Enterprise Storage 6 kernel-source Affected
SUSE Enterprise Storage 7 kernel-source Affected
SUSE Enterprise Storage 7.1 kernel-source Affected
SUSE Linux Enterprise Desktop 11 SP4 kernel-source Not affected
SUSE Linux Enterprise Desktop 12 SP2 kernel-source Not affected
SUSE Linux Enterprise Desktop 12 SP4 kernel-source Affected
SUSE Linux Enterprise Desktop 15 SP1 kernel-source Affected
SUSE Linux Enterprise Desktop 15 SP2 kernel-source Affected
SUSE Linux Enterprise Desktop 15 SP3 kernel-source Affected
SUSE Linux Enterprise Desktop 15 SP4 kernel-source Affected
SUSE Linux Enterprise Desktop 15 SP5 kernel-source Affected
SUSE Linux Enterprise Desktop 15 SP6 kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP1 kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP2 kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP3 kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP6 kernel-source Affected
SUSE Linux Enterprise High Performance Computing 15 SP6 kernel-source-azure Unsupported
SUSE Linux Enterprise Micro 5.0 kernel-default Affected
SUSE Linux Enterprise Micro 5.1 kernel-default Affected
SUSE Linux Enterprise Micro 5.1 kernel-rt Affected
SUSE Linux Enterprise Micro 5.1 kernel-source-rt Affected
SUSE Linux Enterprise Module for Basesystem 15 SP1 kernel-source Affected
SUSE Linux Enterprise Module for Basesystem 15 SP2 kernel-source Affected
SUSE Linux Enterprise Module for Basesystem 15 SP3 kernel-source Affected
SUSE Linux Enterprise Module for Development Tools 15 SP1 kernel-source Affected
SUSE Linux Enterprise Module for Development Tools 15 SP2 kernel-source Affected
SUSE Linux Enterprise Module for Development Tools 15 SP3 kernel-source Affected
SUSE Linux Enterprise Module for Development Tools 15 SP6 kernel-source Affected
SUSE Linux Enterprise Module for Public Cloud 15 SP6 kernel-source-azure Unsupported
SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT kernel-source Not affected
SUSE Linux Enterprise Real Time 15 SP2 kernel-source Affected
SUSE Linux Enterprise Real Time 15 SP3 kernel-source Affected
SUSE Linux Enterprise Real Time 15 SP3 kernel-source-rt Affected
SUSE Linux Enterprise Real Time 15 SP4 kernel-source Affected
SUSE Linux Enterprise Real Time 15 SP4 kernel-source-rt Affected
SUSE Linux Enterprise Real Time 15 SP5 kernel-source-rt Affected
SUSE Linux Enterprise Real Time 15 SP6 kernel-source-rt Unsupported
SUSE Linux Enterprise Server 11 SP4 kernel-source Not affected
SUSE Linux Enterprise Server 11 SP4-LTSS kernel-source Not affected
SUSE Linux Enterprise Server 12 SP2 kernel-source Not affected
SUSE Linux Enterprise Server 12 SP2-BCL kernel-source Not affected
SUSE Linux Enterprise Server 12 SP2-ESPOS kernel-source Not affected
SUSE Linux Enterprise Server 12 SP2-LTSS kernel-default Not affected
SUSE Linux Enterprise Server 12 SP2-LTSS kernel-source Not affected
SUSE Linux Enterprise Server 12 SP4 kernel-source Affected
SUSE Linux Enterprise Server 12 SP4-ESPOS kernel-source Affected
SUSE Linux Enterprise Server 12 SP4-LTSS kernel-default Affected
SUSE Linux Enterprise Server 12 SP4-LTSS kernel-source Affected
SUSE Linux Enterprise Server 15 SP1 kernel-source Affected
SUSE Linux Enterprise Server 15 SP1-BCL kernel-source Affected
SUSE Linux Enterprise Server 15 SP1-LTSS kernel-default Affected
SUSE Linux Enterprise Server 15 SP1-LTSS kernel-source Affected
SUSE Linux Enterprise Server 15 SP2 kernel-source Affected
SUSE Linux Enterprise Server 15 SP2-BCL kernel-source Affected
SUSE Linux Enterprise Server 15 SP2-LTSS kernel-default Affected
SUSE Linux Enterprise Server 15 SP2-LTSS kernel-source Affected
SUSE Linux Enterprise Server 15 SP3 kernel-source Affected
SUSE Linux Enterprise Server 15 SP3-BCL kernel-source Affected
SUSE Linux Enterprise Server 15 SP3-LTSS kernel-default Affected
SUSE Linux Enterprise Server 15 SP3-LTSS kernel-source Affected
SUSE Linux Enterprise Server 15 SP6 kernel-source Affected
SUSE Linux Enterprise Server 15 SP6 kernel-source-azure Unsupported
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 kernel-source Not affected
SUSE Linux Enterprise Server for SAP Applications 12 SP2 kernel-source Not affected
SUSE Linux Enterprise Server for SAP Applications 12 SP4 kernel-source Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP1 kernel-source Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP2 kernel-source Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP3 kernel-source Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP4 kernel-default Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP4 kernel-source Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP5 kernel-default Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP5 kernel-source Affected
SUSE Manager Proxy 4.0 kernel-source Affected
SUSE Manager Proxy 4.1 kernel-source Affected
SUSE Manager Proxy 4.2 kernel-source Affected
SUSE Manager Retail Branch Server 4.0 kernel-source Affected
SUSE Manager Retail Branch Server 4.1 kernel-source Affected
SUSE Manager Retail Branch Server 4.2 kernel-source Affected
SUSE Manager Server 4.0 kernel-source Affected
SUSE Manager Server 4.1 kernel-source Affected
SUSE Manager Server 4.2 kernel-source Affected
SUSE OpenStack Cloud 7 kernel-source Not affected
SUSE OpenStack Cloud 9 kernel-source Affected
SUSE OpenStack Cloud Crowbar 9 kernel-source Affected
SUSE Real Time Module 15 SP3 kernel-source-rt Affected
SUSE Real Time Module 15 SP4 kernel-source-rt Affected
SUSE Real Time Module 15 SP5 kernel-source-rt Affected
SUSE Real Time Module 15 SP6 kernel-source-rt Unsupported
openSUSE Leap 15.3 kernel-source Affected
openSUSE Leap 15.3 kernel-source-rt Affected
openSUSE Leap 15.4 kernel-source Affected
openSUSE Leap 15.4 kernel-source-rt Affected
openSUSE Leap 15.5 kernel-source Affected
openSUSE Leap 15.5 kernel-source-rt Affected


SUSE Timeline for this CVE

CVE page created: Fri Jan 23 16:02:36 2026
CVE page last modified: Fri Jan 23 20:03:27 2026