Cyber Posture

CVE-2025-21761

High

Published: 27 February 2025

Published
27 February 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 2.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

In the Linux kernel, the following vulnerability has been resolved: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() ovs_vport_cmd_fill_info() can be called without RTNL or RCU. Use RCU protection and dev_net_rcu() to avoid potential UAF.

Security Summary

CVE-2025-21761 is a use-after-free (UAF) vulnerability in the Linux kernel's Open vSwitch (OVS) implementation, specifically within the ovs_vport_cmd_fill_info() function. This function could be invoked without proper Reverse Path Network Link (RTNL) or Read-Copy Update (RCU) protection, leading to potential UAF conditions. The issue, classified under CWE-416, affects Linux kernel versions incorporating Open vSwitch and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

A local attacker with low privileges can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation could result in high-impact consequences, including unauthorized access to sensitive data (high confidentiality impact), modification of kernel state (high integrity impact), and system denial of service or crashes (high availability impact), potentially elevating privileges within the kernel context.

Mitigation is available through patches applied to Linux kernel stable branches, as detailed in the referenced commits: 5828937742af74666192835d657095d95c53dbd0, 7e01abc34e87abd091e619161a20f54ed4e3e2da, 8ec57509c36c8b9a23e50b7858dda0c520a2d074, 90b2f49a502fa71090d9f4fe29a2f51fe5dff76d, and a849a10de5e04d798f7f286a2f1ca174719a617a. These commits implement RCU protection and utilize dev_net_rcu() to prevent the UAF by ensuring safe access to network device structures. Security practitioners should update affected kernel versions promptly, particularly in environments using Open vSwitch for virtual networking.

Details

CWE(s)
CWE-416

Affected Products

linux
linux kernel
6.14 · 4.15 — 5.4.291 · 5.5 — 5.10.235 · 5.11 — 5.15.179

References