CVE-2025-21971: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net_sched: Prevent creation of classes with TC_H_ROOT The function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination condition when traversing up the qdisc tree to update parent backlog counters. However, if a class is created with classid TC_H_ROOT, the traversal terminates prematurely at this class instead of reaching the actual root qdisc, causing parent statistics to be incorrectly maintained. In case of DRR, this could lead to a crash as reported by Mingi Cho. Prevent the creation of any Qdisc class with classid TC_H_ROOT (0xFFFFFFFF) across all qdisc types, as suggested by Jamal.
AI Analysis
Technical Summary
CVE-2025-21971 is a vulnerability identified in the Linux kernel's network scheduler (net_sched) subsystem, specifically related to the handling of traffic control (tc) classes. The vulnerability arises from the function qdisc_tree_reduce_backlog(), which traverses the queueing discipline (qdisc) tree to update parent backlog counters. This function uses the special class identifier TC_H_ROOT (0xFFFFFFFF) as a termination condition to identify the root of the qdisc tree. However, the vulnerability occurs because it is possible to create a qdisc class with the classid set to TC_H_ROOT. When this happens, the traversal prematurely terminates at this class rather than reaching the actual root qdisc. This leads to incorrect maintenance of parent backlog statistics. In particular, for the Deficit Round Robin (DRR) qdisc, this miscalculation can cause a kernel crash, as reported by the researcher Mingi Cho. The root cause is that the system does not prevent the creation of classes with the reserved classid TC_H_ROOT, which should be unique and reserved for the root qdisc. The fix implemented prevents the creation of any qdisc class with the classid TC_H_ROOT across all qdisc types, thereby ensuring the traversal logic functions correctly and preventing potential crashes. This vulnerability affects multiple versions of the Linux kernel identified by the commit hash 066a3b5b2346febf9a655b444567b7138e3bb939. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions that utilize the network scheduler subsystem, especially those employing the Deficit Round Robin (DRR) qdisc for traffic shaping and quality of service. A successful exploitation could lead to kernel crashes, resulting in denial of service (DoS) conditions. This could disrupt critical network services, degrade performance, or cause outages in environments relying on Linux-based routers, firewalls, or servers handling network traffic management. In sectors such as telecommunications, finance, healthcare, and critical infrastructure—where Linux is widely deployed—such disruptions could have significant operational and financial consequences. Additionally, while no known exploits exist currently, the vulnerability's nature could allow a local attacker or a malicious process with sufficient privileges to trigger the crash, potentially as part of a broader attack to degrade system availability or cause instability. The incorrect backlog statistics could also impact network traffic management accuracy, potentially leading to suboptimal network performance or security monitoring blind spots.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to versions that include the patch preventing the creation of classes with the TC_H_ROOT classid. Since the vulnerability is rooted in the kernel's network scheduler, kernel updates from trusted Linux distributions should be applied promptly. Network administrators should audit their systems to identify any custom or third-party qdisc configurations that might attempt to create classes with reserved classids and remove or correct them. Additionally, organizations should implement strict access controls to limit who can modify qdisc configurations, as exploitation requires the ability to create or modify traffic control classes. Monitoring kernel logs for unusual qdisc-related errors or crashes can provide early detection of attempted exploitation. For critical systems, consider deploying kernel live patching solutions to minimize downtime during patch application. Finally, maintain a robust incident response plan to quickly address any service disruptions potentially caused by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2025-21971: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net_sched: Prevent creation of classes with TC_H_ROOT The function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination condition when traversing up the qdisc tree to update parent backlog counters. However, if a class is created with classid TC_H_ROOT, the traversal terminates prematurely at this class instead of reaching the actual root qdisc, causing parent statistics to be incorrectly maintained. In case of DRR, this could lead to a crash as reported by Mingi Cho. Prevent the creation of any Qdisc class with classid TC_H_ROOT (0xFFFFFFFF) across all qdisc types, as suggested by Jamal.
AI-Powered Analysis
Technical Analysis
CVE-2025-21971 is a vulnerability identified in the Linux kernel's network scheduler (net_sched) subsystem, specifically related to the handling of traffic control (tc) classes. The vulnerability arises from the function qdisc_tree_reduce_backlog(), which traverses the queueing discipline (qdisc) tree to update parent backlog counters. This function uses the special class identifier TC_H_ROOT (0xFFFFFFFF) as a termination condition to identify the root of the qdisc tree. However, the vulnerability occurs because it is possible to create a qdisc class with the classid set to TC_H_ROOT. When this happens, the traversal prematurely terminates at this class rather than reaching the actual root qdisc. This leads to incorrect maintenance of parent backlog statistics. In particular, for the Deficit Round Robin (DRR) qdisc, this miscalculation can cause a kernel crash, as reported by the researcher Mingi Cho. The root cause is that the system does not prevent the creation of classes with the reserved classid TC_H_ROOT, which should be unique and reserved for the root qdisc. The fix implemented prevents the creation of any qdisc class with the classid TC_H_ROOT across all qdisc types, thereby ensuring the traversal logic functions correctly and preventing potential crashes. This vulnerability affects multiple versions of the Linux kernel identified by the commit hash 066a3b5b2346febf9a655b444567b7138e3bb939. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions that utilize the network scheduler subsystem, especially those employing the Deficit Round Robin (DRR) qdisc for traffic shaping and quality of service. A successful exploitation could lead to kernel crashes, resulting in denial of service (DoS) conditions. This could disrupt critical network services, degrade performance, or cause outages in environments relying on Linux-based routers, firewalls, or servers handling network traffic management. In sectors such as telecommunications, finance, healthcare, and critical infrastructure—where Linux is widely deployed—such disruptions could have significant operational and financial consequences. Additionally, while no known exploits exist currently, the vulnerability's nature could allow a local attacker or a malicious process with sufficient privileges to trigger the crash, potentially as part of a broader attack to degrade system availability or cause instability. The incorrect backlog statistics could also impact network traffic management accuracy, potentially leading to suboptimal network performance or security monitoring blind spots.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to versions that include the patch preventing the creation of classes with the TC_H_ROOT classid. Since the vulnerability is rooted in the kernel's network scheduler, kernel updates from trusted Linux distributions should be applied promptly. Network administrators should audit their systems to identify any custom or third-party qdisc configurations that might attempt to create classes with reserved classids and remove or correct them. Additionally, organizations should implement strict access controls to limit who can modify qdisc configurations, as exploitation requires the ability to create or modify traffic control classes. Monitoring kernel logs for unusual qdisc-related errors or crashes can provide early detection of attempted exploitation. For critical systems, consider deploying kernel live patching solutions to minimize downtime during patch application. Finally, maintain a robust incident response plan to quickly address any service disruptions potentially caused by this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.797Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe8dba
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 11:25:23 AM
Last updated: 8/11/2025, 6:11:46 PM
Views: 15
Related Threats
CVE-2025-8974: Hard-coded Credentials in linlinjava litemall
MediumCVE-2025-8973: SQL Injection in SourceCodester Cashier Queuing System
MediumCVE-2025-21110: CWE-250: Execution with Unnecessary Privileges in Dell Data Lakehouse
MediumCVE-2025-8972: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-51986: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.