Use After Free Vulnerability in Linux Kernel Networking Component
CVE-2025-21700

7.8HIGH

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
13 February 2025

Summary

A vulnerability in the Linux kernel's networking subsystem allows for a use-after-free condition that can be exploited to gain elevated privileges. The flaw arises when managing queued disc drivers (qdiscs) in network traffic control. Specifically, the vulnerability permits an attacker to replace child qdiscs from one parent to another, potentially allowing unauthorized actions on the network node. A proper patch has been implemented to prevent improper configurations, ensuring that once a qdisc is assigned to a parent, it cannot be altered improperly, thus mitigating the risk of privilege escalation.

Affected Version(s)

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 38646749d6e12f9d80a08d21ca39f0beca20230d

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.