CVE-2025-21745: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix class @block_class's subsystem refcount leakage blkcg_fill_root_iostats() iterates over @block_class's devices by class_dev_iter_(init|next)(), but does not end iterating with class_dev_iter_exit(), so causes the class's subsystem refcount leakage. Fix by ending the iterating with class_dev_iter_exit().
AI Analysis
Technical Summary
CVE-2025-21745 is a vulnerability identified in the Linux kernel's block control group (blk-cgroup) subsystem, specifically related to the handling of the block_class's subsystem reference counting. The issue arises in the function blkcg_fill_root_iostats(), which iterates over devices associated with the block_class using class_dev_iter_init() and class_dev_iter_next() functions. However, the iteration process does not properly conclude with a call to class_dev_iter_exit(), leading to a subsystem reference count leakage. This leakage means that the reference count for the block_class subsystem is not decremented appropriately after iteration, potentially causing resource mismanagement within the kernel. Although the vulnerability does not directly indicate a memory corruption or immediate code execution risk, the improper reference counting can lead to resource exhaustion or instability in the kernel's block I/O control group management. The fix involves ensuring that the iteration over devices ends with a call to class_dev_iter_exit(), properly releasing the subsystem reference and preventing the leak. This vulnerability affects specific Linux kernel versions identified by the commit hash ef45fe470e1e5410db4af87abc5d5055427945ac. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2025-21745 primarily concerns the stability and reliability of Linux-based systems, especially those heavily utilizing block control groups for I/O resource management, such as servers, cloud infrastructure, and containerized environments. Resource leakage in the kernel can lead to gradual degradation of system performance, increased memory or resource consumption, and potentially kernel instability or crashes under sustained load. This can disrupt critical services, cause downtime, and affect data availability. While the vulnerability does not directly expose confidentiality or integrity risks, the availability impact can be significant for organizations relying on Linux servers for essential operations. Systems running older or unpatched Linux kernels are at risk, and the lack of a known exploit suggests the threat is currently low but could be leveraged in targeted attacks or combined with other vulnerabilities to escalate impact. European organizations with large-scale Linux deployments, including cloud providers, financial institutions, and public sector entities, should be particularly vigilant.
Mitigation Recommendations
To mitigate CVE-2025-21745, organizations should promptly apply the official Linux kernel patches that address the reference count leakage in the blk-cgroup subsystem. System administrators should: 1) Identify all Linux systems running affected kernel versions, especially those using block control groups for I/O management. 2) Schedule and perform kernel updates to versions containing the fix (post commit ef45fe470e1e5410db4af87abc5d5055427945ac). 3) Monitor system resource usage and kernel logs for signs of resource leaks or instability that could indicate exploitation or impact. 4) For environments where immediate patching is challenging, consider limiting the use of blk-cgroup features or isolating affected systems to reduce risk exposure. 5) Maintain robust backup and recovery procedures to minimize downtime in case of system instability. 6) Stay informed through Linux kernel security advisories and community channels for any emerging exploit information or additional mitigations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Italy, Spain, Poland
CVE-2025-21745: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix class @block_class's subsystem refcount leakage blkcg_fill_root_iostats() iterates over @block_class's devices by class_dev_iter_(init|next)(), but does not end iterating with class_dev_iter_exit(), so causes the class's subsystem refcount leakage. Fix by ending the iterating with class_dev_iter_exit().
AI-Powered Analysis
Technical Analysis
CVE-2025-21745 is a vulnerability identified in the Linux kernel's block control group (blk-cgroup) subsystem, specifically related to the handling of the block_class's subsystem reference counting. The issue arises in the function blkcg_fill_root_iostats(), which iterates over devices associated with the block_class using class_dev_iter_init() and class_dev_iter_next() functions. However, the iteration process does not properly conclude with a call to class_dev_iter_exit(), leading to a subsystem reference count leakage. This leakage means that the reference count for the block_class subsystem is not decremented appropriately after iteration, potentially causing resource mismanagement within the kernel. Although the vulnerability does not directly indicate a memory corruption or immediate code execution risk, the improper reference counting can lead to resource exhaustion or instability in the kernel's block I/O control group management. The fix involves ensuring that the iteration over devices ends with a call to class_dev_iter_exit(), properly releasing the subsystem reference and preventing the leak. This vulnerability affects specific Linux kernel versions identified by the commit hash ef45fe470e1e5410db4af87abc5d5055427945ac. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2025-21745 primarily concerns the stability and reliability of Linux-based systems, especially those heavily utilizing block control groups for I/O resource management, such as servers, cloud infrastructure, and containerized environments. Resource leakage in the kernel can lead to gradual degradation of system performance, increased memory or resource consumption, and potentially kernel instability or crashes under sustained load. This can disrupt critical services, cause downtime, and affect data availability. While the vulnerability does not directly expose confidentiality or integrity risks, the availability impact can be significant for organizations relying on Linux servers for essential operations. Systems running older or unpatched Linux kernels are at risk, and the lack of a known exploit suggests the threat is currently low but could be leveraged in targeted attacks or combined with other vulnerabilities to escalate impact. European organizations with large-scale Linux deployments, including cloud providers, financial institutions, and public sector entities, should be particularly vigilant.
Mitigation Recommendations
To mitigate CVE-2025-21745, organizations should promptly apply the official Linux kernel patches that address the reference count leakage in the blk-cgroup subsystem. System administrators should: 1) Identify all Linux systems running affected kernel versions, especially those using block control groups for I/O management. 2) Schedule and perform kernel updates to versions containing the fix (post commit ef45fe470e1e5410db4af87abc5d5055427945ac). 3) Monitor system resource usage and kernel logs for signs of resource leaks or instability that could indicate exploitation or impact. 4) For environments where immediate patching is challenging, consider limiting the use of blk-cgroup features or isolating affected systems to reduce risk exposure. 5) Maintain robust backup and recovery procedures to minimize downtime in case of system instability. 6) Stay informed through Linux kernel security advisories and community channels for any emerging exploit information or additional mitigations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.757Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9832c4522896dcbe867e
Added to database: 5/21/2025, 9:09:06 AM
Last enriched: 6/30/2025, 8:42:36 AM
Last updated: 8/17/2025, 10:19:25 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.