CVE-2025-21958: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: Revert "openvswitch: switch to per-action label counting in conntrack" Currently, ovs_ct_set_labels() is only called for confirmed conntrack entries (ct) within ovs_ct_commit(). However, if the conntrack entry does not have the labels_ext extension, attempting to allocate it in ovs_ct_get_conn_labels() for a confirmed entry triggers a warning in nf_ct_ext_add(): WARN_ON(nf_ct_is_confirmed(ct)); This happens when the conntrack entry is created externally before OVS increments net->ct.labels_used. The issue has become more likely since commit fcb1aa5163b1 ("openvswitch: switch to per-action label counting in conntrack"), which changed to use per-action label counting and increment net->ct.labels_used when a flow with ct action is added. Since there’s no straightforward way to fully resolve this issue at the moment, this reverts the commit to avoid breaking existing use cases.
AI Analysis
Technical Summary
CVE-2025-21958 is a vulnerability identified in the Linux kernel, specifically related to the Open vSwitch (OVS) component's handling of connection tracking (conntrack) labels. The issue arises from a recent change in the OVS codebase where label counting for conntrack entries was switched to a per-action basis, incrementing the net->ct.labels_used counter when a flow with a conntrack action is added. The vulnerability manifests when a conntrack entry, created externally and confirmed, lacks the labels_ext extension. In such cases, the function ovs_ct_get_conn_labels() attempts to allocate this extension, triggering a warning in nf_ct_ext_add() due to the confirmed state of the conntrack entry. This warning is caused by the nf_ct_is_confirmed(ct) check, which is not expected to fail for confirmed entries. The root cause is that the external creation of conntrack entries occurs before OVS increments the labels_used counter, leading to inconsistent state and potential instability. Since a straightforward fix is not currently available, the Linux kernel maintainers reverted the commit that introduced the per-action label counting to avoid breaking existing use cases. This vulnerability is primarily a kernel-level logic flaw affecting the OVS conntrack label management, potentially leading to kernel warnings and instability but with no known exploits in the wild at this time.
Potential Impact
For European organizations relying on Linux systems with Open vSwitch for network virtualization, software-defined networking (SDN), or advanced firewalling, this vulnerability could lead to kernel instability or warnings that may degrade network performance or cause unexpected behavior in network traffic handling. While no direct exploitation or remote code execution has been reported, the instability could be leveraged in complex attack scenarios to cause denial of service or disrupt critical network functions. Organizations in sectors such as telecommunications, cloud service providers, financial institutions, and large enterprises using Linux-based network infrastructure could face operational disruptions. Additionally, the lack of a straightforward fix means that organizations must carefully manage kernel updates and monitor for any side effects related to this vulnerability. The impact on confidentiality and integrity is low, but availability could be affected if the kernel warnings escalate to crashes or degraded network performance.
Mitigation Recommendations
European organizations should prioritize applying the kernel update that reverts the problematic commit, as this is the current official resolution to avoid breaking existing use cases. Network administrators should monitor kernel logs for warnings related to nf_ct_ext_add() and nf_ct_is_confirmed() to detect potential triggering of this issue. It is advisable to audit and control the creation of conntrack entries, especially those created externally, to ensure they do not lead to inconsistent label states. Organizations should also consider isolating critical network functions on systems with patched kernels and avoid deploying untested kernel versions containing the per-action label counting change. Engaging with Linux kernel maintainers and following updates on this issue is important to apply any future patches that fully resolve the underlying problem. Additionally, implementing robust network segmentation and redundancy can mitigate the impact of potential network disruptions caused by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-21958: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: Revert "openvswitch: switch to per-action label counting in conntrack" Currently, ovs_ct_set_labels() is only called for confirmed conntrack entries (ct) within ovs_ct_commit(). However, if the conntrack entry does not have the labels_ext extension, attempting to allocate it in ovs_ct_get_conn_labels() for a confirmed entry triggers a warning in nf_ct_ext_add(): WARN_ON(nf_ct_is_confirmed(ct)); This happens when the conntrack entry is created externally before OVS increments net->ct.labels_used. The issue has become more likely since commit fcb1aa5163b1 ("openvswitch: switch to per-action label counting in conntrack"), which changed to use per-action label counting and increment net->ct.labels_used when a flow with ct action is added. Since there’s no straightforward way to fully resolve this issue at the moment, this reverts the commit to avoid breaking existing use cases.
AI-Powered Analysis
Technical Analysis
CVE-2025-21958 is a vulnerability identified in the Linux kernel, specifically related to the Open vSwitch (OVS) component's handling of connection tracking (conntrack) labels. The issue arises from a recent change in the OVS codebase where label counting for conntrack entries was switched to a per-action basis, incrementing the net->ct.labels_used counter when a flow with a conntrack action is added. The vulnerability manifests when a conntrack entry, created externally and confirmed, lacks the labels_ext extension. In such cases, the function ovs_ct_get_conn_labels() attempts to allocate this extension, triggering a warning in nf_ct_ext_add() due to the confirmed state of the conntrack entry. This warning is caused by the nf_ct_is_confirmed(ct) check, which is not expected to fail for confirmed entries. The root cause is that the external creation of conntrack entries occurs before OVS increments the labels_used counter, leading to inconsistent state and potential instability. Since a straightforward fix is not currently available, the Linux kernel maintainers reverted the commit that introduced the per-action label counting to avoid breaking existing use cases. This vulnerability is primarily a kernel-level logic flaw affecting the OVS conntrack label management, potentially leading to kernel warnings and instability but with no known exploits in the wild at this time.
Potential Impact
For European organizations relying on Linux systems with Open vSwitch for network virtualization, software-defined networking (SDN), or advanced firewalling, this vulnerability could lead to kernel instability or warnings that may degrade network performance or cause unexpected behavior in network traffic handling. While no direct exploitation or remote code execution has been reported, the instability could be leveraged in complex attack scenarios to cause denial of service or disrupt critical network functions. Organizations in sectors such as telecommunications, cloud service providers, financial institutions, and large enterprises using Linux-based network infrastructure could face operational disruptions. Additionally, the lack of a straightforward fix means that organizations must carefully manage kernel updates and monitor for any side effects related to this vulnerability. The impact on confidentiality and integrity is low, but availability could be affected if the kernel warnings escalate to crashes or degraded network performance.
Mitigation Recommendations
European organizations should prioritize applying the kernel update that reverts the problematic commit, as this is the current official resolution to avoid breaking existing use cases. Network administrators should monitor kernel logs for warnings related to nf_ct_ext_add() and nf_ct_is_confirmed() to detect potential triggering of this issue. It is advisable to audit and control the creation of conntrack entries, especially those created externally, to ensure they do not lead to inconsistent label states. Organizations should also consider isolating critical network functions on systems with patched kernels and avoid deploying untested kernel versions containing the per-action label counting change. Engaging with Linux kernel maintainers and following updates on this issue is important to apply any future patches that fully resolve the underlying problem. Additionally, implementing robust network segmentation and redundancy can mitigate the impact of potential network disruptions caused by this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.791Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe8d32
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 11:11:51 AM
Last updated: 1/7/2026, 4:15:05 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.