Skip to main content

CVE-2025-21926: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-21926cvecve-2025-21926
Published: Tue Apr 01 2025 (04/01/2025, 15:40:57 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: gso: fix ownership in __udp_gso_segment In __udp_gso_segment the skb destructor is removed before segmenting the skb but the socket reference is kept as-is. This is an issue if the original skb is later orphaned as we can hit the following bug: kernel BUG at ./include/linux/skbuff.h:3312! (skb_orphan) RIP: 0010:ip_rcv_core+0x8b2/0xca0 Call Trace: ip_rcv+0xab/0x6e0 __netif_receive_skb_one_core+0x168/0x1b0 process_backlog+0x384/0x1100 __napi_poll.constprop.0+0xa1/0x370 net_rx_action+0x925/0xe50 The above can happen following a sequence of events when using OpenVSwitch, when an OVS_ACTION_ATTR_USERSPACE action precedes an OVS_ACTION_ATTR_OUTPUT action: 1. OVS_ACTION_ATTR_USERSPACE is handled (in do_execute_actions): the skb goes through queue_gso_packets and then __udp_gso_segment, where its destructor is removed. 2. The segments' data are copied and sent to userspace. 3. OVS_ACTION_ATTR_OUTPUT is handled (in do_execute_actions) and the same original skb is sent to its path. 4. If it later hits skb_orphan, we hit the bug. Fix this by also removing the reference to the socket in __udp_gso_segment.

AI-Powered Analysis

AILast updated: 06/30/2025, 10:43:15 UTC

Technical Analysis

CVE-2025-21926 is a vulnerability in the Linux kernel's networking stack, specifically within the Generic Segmentation Offload (GSO) handling for UDP packets. The issue arises in the __udp_gso_segment function, which segments large UDP packets for transmission. During this process, the socket buffer (skb) destructor is removed before segmentation, but the socket reference itself is not cleared. This leads to a problematic state if the original skb is later orphaned, triggering a kernel BUG at skb_orphan. The bug manifests as a kernel panic or crash, as indicated by the call trace involving ip_rcv_core and skb_orphan functions. The vulnerability is particularly triggered in scenarios involving OpenVSwitch (OVS) when an OVS_ACTION_ATTR_USERSPACE action precedes an OVS_ACTION_ATTR_OUTPUT action. In this sequence, the skb is processed through queue_gso_packets and __udp_gso_segment, where the destructor is removed but the socket reference remains. The segmented data is copied and sent to userspace, and subsequently, the original skb is sent through its normal path. If the skb later hits skb_orphan, the kernel BUG occurs. The root cause is the failure to remove the socket reference in __udp_gso_segment, which the patch addresses by ensuring that the socket reference is also removed alongside the destructor. This vulnerability can cause denial of service (DoS) through kernel crashes, impacting system stability and availability. There is no indication of remote code execution or privilege escalation directly from this bug, but the kernel panic can disrupt network services and potentially be exploited in targeted attacks involving OpenVSwitch configurations.

Potential Impact

For European organizations, the impact of CVE-2025-21926 can be significant, especially for those relying on Linux-based infrastructure with OpenVSwitch deployments. OpenVSwitch is widely used in data centers, cloud environments, and network virtualization setups common in European enterprises and service providers. A kernel panic caused by this vulnerability can lead to denial of service, disrupting critical network functions, virtualized environments, and containerized workloads. This can affect availability of services, leading to operational downtime and potential financial losses. Additionally, organizations with stringent uptime requirements, such as financial institutions, telecommunications providers, and public sector entities, may face compliance and reputational risks if network outages occur. Although no known exploits are reported in the wild, the vulnerability's presence in the kernel networking stack means that attackers with network access or the ability to influence OpenVSwitch actions could potentially trigger the bug. This elevates the risk in multi-tenant cloud environments and managed service providers prevalent in Europe. The vulnerability does not appear to compromise confidentiality or integrity directly but poses a high availability risk.

Mitigation Recommendations

To mitigate CVE-2025-21926, European organizations should: 1) Apply the official Linux kernel patches that fix the socket reference removal in __udp_gso_segment as soon as they are available and tested. 2) For environments using OpenVSwitch, review and update OVS versions to those incorporating the fix or apply vendor-provided patches. 3) Implement robust kernel crash monitoring and automated recovery mechanisms to minimize downtime if a kernel panic occurs. 4) Restrict and monitor network access to systems running vulnerable Linux kernels, especially limiting untrusted user or network inputs that could trigger the vulnerable code path. 5) Employ network segmentation and isolation for critical infrastructure to reduce the attack surface. 6) Conduct thorough testing in staging environments to validate the patch and ensure no regressions in network performance or stability. 7) Maintain up-to-date inventories of Linux kernel versions and OpenVSwitch deployments to prioritize patching efforts. 8) Consider deploying kernel live patching solutions where feasible to reduce downtime during patch application.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.788Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe8c10

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 10:43:15 AM

Last updated: 8/12/2025, 4:57:55 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats