Skip to main content

CVE-2025-21745: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-21745cvecve-2025-21745
Published: Thu Feb 27 2025 (02/27/2025, 02:12:17 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix class @block_class's subsystem refcount leakage blkcg_fill_root_iostats() iterates over @block_class's devices by class_dev_iter_(init|next)(), but does not end iterating with class_dev_iter_exit(), so causes the class's subsystem refcount leakage. Fix by ending the iterating with class_dev_iter_exit().

AI-Powered Analysis

AILast updated: 06/30/2025, 08:42:36 UTC

Technical Analysis

CVE-2025-21745 is a vulnerability identified in the Linux kernel's block control group (blk-cgroup) subsystem, specifically related to the handling of the block_class's subsystem reference counting. The issue arises in the function blkcg_fill_root_iostats(), which iterates over devices associated with the block_class using class_dev_iter_init() and class_dev_iter_next() functions. However, the iteration process does not properly conclude with a call to class_dev_iter_exit(), leading to a subsystem reference count leakage. This leakage means that the reference count for the block_class subsystem is not decremented appropriately after iteration, potentially causing resource mismanagement within the kernel. Although the vulnerability does not directly indicate a memory corruption or immediate code execution risk, the improper reference counting can lead to resource exhaustion or instability in the kernel's block I/O control group management. The fix involves ensuring that the iteration over devices ends with a call to class_dev_iter_exit(), properly releasing the subsystem reference and preventing the leak. This vulnerability affects specific Linux kernel versions identified by the commit hash ef45fe470e1e5410db4af87abc5d5055427945ac. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2025-21745 primarily concerns the stability and reliability of Linux-based systems, especially those heavily utilizing block control groups for I/O resource management, such as servers, cloud infrastructure, and containerized environments. Resource leakage in the kernel can lead to gradual degradation of system performance, increased memory or resource consumption, and potentially kernel instability or crashes under sustained load. This can disrupt critical services, cause downtime, and affect data availability. While the vulnerability does not directly expose confidentiality or integrity risks, the availability impact can be significant for organizations relying on Linux servers for essential operations. Systems running older or unpatched Linux kernels are at risk, and the lack of a known exploit suggests the threat is currently low but could be leveraged in targeted attacks or combined with other vulnerabilities to escalate impact. European organizations with large-scale Linux deployments, including cloud providers, financial institutions, and public sector entities, should be particularly vigilant.

Mitigation Recommendations

To mitigate CVE-2025-21745, organizations should promptly apply the official Linux kernel patches that address the reference count leakage in the blk-cgroup subsystem. System administrators should: 1) Identify all Linux systems running affected kernel versions, especially those using block control groups for I/O management. 2) Schedule and perform kernel updates to versions containing the fix (post commit ef45fe470e1e5410db4af87abc5d5055427945ac). 3) Monitor system resource usage and kernel logs for signs of resource leaks or instability that could indicate exploitation or impact. 4) For environments where immediate patching is challenging, consider limiting the use of blk-cgroup features or isolating affected systems to reduce risk exposure. 5) Maintain robust backup and recovery procedures to minimize downtime in case of system instability. 6) Stay informed through Linux kernel security advisories and community channels for any emerging exploit information or additional mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.757Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9832c4522896dcbe867e

Added to database: 5/21/2025, 9:09:06 AM

Last enriched: 6/30/2025, 8:42:36 AM

Last updated: 8/17/2025, 10:19:25 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats