Skip to main content

CVE-2025-21958: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-21958cvecve-2025-21958
Published: Tue Apr 01 2025 (04/01/2025, 15:46:57 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Revert "openvswitch: switch to per-action label counting in conntrack" Currently, ovs_ct_set_labels() is only called for confirmed conntrack entries (ct) within ovs_ct_commit(). However, if the conntrack entry does not have the labels_ext extension, attempting to allocate it in ovs_ct_get_conn_labels() for a confirmed entry triggers a warning in nf_ct_ext_add(): WARN_ON(nf_ct_is_confirmed(ct)); This happens when the conntrack entry is created externally before OVS increments net->ct.labels_used. The issue has become more likely since commit fcb1aa5163b1 ("openvswitch: switch to per-action label counting in conntrack"), which changed to use per-action label counting and increment net->ct.labels_used when a flow with ct action is added. Since there’s no straightforward way to fully resolve this issue at the moment, this reverts the commit to avoid breaking existing use cases.

AI-Powered Analysis

AILast updated: 06/30/2025, 11:11:51 UTC

Technical Analysis

CVE-2025-21958 is a vulnerability identified in the Linux kernel, specifically related to the Open vSwitch (OVS) component's handling of connection tracking (conntrack) labels. The issue arises from a recent change in the OVS codebase where label counting for conntrack entries was switched to a per-action basis, incrementing the net->ct.labels_used counter when a flow with a conntrack action is added. The vulnerability manifests when a conntrack entry, created externally and confirmed, lacks the labels_ext extension. In such cases, the function ovs_ct_get_conn_labels() attempts to allocate this extension, triggering a warning in nf_ct_ext_add() due to the confirmed state of the conntrack entry. This warning is caused by the nf_ct_is_confirmed(ct) check, which is not expected to fail for confirmed entries. The root cause is that the external creation of conntrack entries occurs before OVS increments the labels_used counter, leading to inconsistent state and potential instability. Since a straightforward fix is not currently available, the Linux kernel maintainers reverted the commit that introduced the per-action label counting to avoid breaking existing use cases. This vulnerability is primarily a kernel-level logic flaw affecting the OVS conntrack label management, potentially leading to kernel warnings and instability but with no known exploits in the wild at this time.

Potential Impact

For European organizations relying on Linux systems with Open vSwitch for network virtualization, software-defined networking (SDN), or advanced firewalling, this vulnerability could lead to kernel instability or warnings that may degrade network performance or cause unexpected behavior in network traffic handling. While no direct exploitation or remote code execution has been reported, the instability could be leveraged in complex attack scenarios to cause denial of service or disrupt critical network functions. Organizations in sectors such as telecommunications, cloud service providers, financial institutions, and large enterprises using Linux-based network infrastructure could face operational disruptions. Additionally, the lack of a straightforward fix means that organizations must carefully manage kernel updates and monitor for any side effects related to this vulnerability. The impact on confidentiality and integrity is low, but availability could be affected if the kernel warnings escalate to crashes or degraded network performance.

Mitigation Recommendations

European organizations should prioritize applying the kernel update that reverts the problematic commit, as this is the current official resolution to avoid breaking existing use cases. Network administrators should monitor kernel logs for warnings related to nf_ct_ext_add() and nf_ct_is_confirmed() to detect potential triggering of this issue. It is advisable to audit and control the creation of conntrack entries, especially those created externally, to ensure they do not lead to inconsistent label states. Organizations should also consider isolating critical network functions on systems with patched kernels and avoid deploying untested kernel versions containing the per-action label counting change. Engaging with Linux kernel maintainers and following updates on this issue is important to apply any future patches that fully resolve the underlying problem. Additionally, implementing robust network segmentation and redundancy can mitigate the impact of potential network disruptions caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.791Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe8d32

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 11:11:51 AM

Last updated: 8/5/2025, 12:46:04 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats