Cyber Posture

CVE-2025-21703

High

Published: 18 February 2025

Published
18 February 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 3.8th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

In the Linux kernel, the following vulnerability has been resolved: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() qdisc_tree_reduce_backlog() notifies parent qdisc only if child qdisc becomes empty, therefore we need to reduce the backlog of the child qdisc before calling it. Otherwise it would miss the opportunity to call cops->qlen_notify(), in the case of DRR, it resulted in UAF since DRR uses ->qlen_notify() to maintain its active list.

Security Summary

CVE-2025-21703 is a Use-After-Free (UAF) vulnerability in the Linux kernel's netem (network emulator) component, stemming from a failure to update sch->q.qlen before calling qdisc_tree_reduce_backlog(). This issue affects queueing discipline (qdisc) handling, where qdisc_tree_reduce_backlog() only notifies the parent qdisc if the child becomes empty. Without prior backlog reduction in the child, notifications like cops->qlen_notify() are missed, leading to UAF in scenarios such as Deficit Round Robin (DRR), which relies on qlen_notify() for its active list maintenance. The vulnerability carries a CVSS v3.1 base score of 7.8 and is classified under CWE-416.

A local attacker with low privileges (PR:L) can exploit this vulnerability with low complexity (AC:L) and no user interaction (UI:N). Successful exploitation grants high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged security scope (S:U), potentially allowing arbitrary code execution, data corruption, or system crashes through manipulated network queueing operations in netem and related qdiscs like DRR.

Mitigation involves applying kernel patches from the referenced stable commits, such as https://git.kernel.org/stable/c/1f8e3f4a4b8b90ad274dfbc66fc7d55cb582f4d5 and others, which ensure sch->q.qlen is updated before qdisc_tree_reduce_backlog() to properly trigger parent notifications and prevent the UAF. Security practitioners should update affected Linux kernels to versions incorporating these fixes.

Details

CWE(s)
CWE-416

Affected Products

linux
linux kernel
6.14 · 5.4.288 — 5.4.291 · 5.10.232 — 5.10.235 · 5.15.175 — 5.15.179

References