Linux Kernel Vulnerability in Networking Component Affecting Kernel Functionality
CVE-2025-21857
Summary
A vulnerability has been identified in the Linux kernel networking stack, particularly within the classful queuing framework. An error in error handling during the allocation process can lead to a NULL pointer dereference. When the function tcf_exts_miss_cookie_base_alloc() erroneously treats a successful allocation returning a '1' as a failure, this misleading output can propagate through several function calls. Ultimately, this results in the kernel attempting to dereference a null pointer, leading to potential crashes or instability. Proper validation measures should be ensured to prevent such erroneous behaviors.
Affected Version(s)
Linux 80cd22c35c9001fe72bf614d29439de41933deca
Linux 80cd22c35c9001fe72bf614d29439de41933deca < 3e4c56cf41876ef2a82f0877fe2a67648f8632b8
Linux 80cd22c35c9001fe72bf614d29439de41933deca < 3c74b5787caf59bb1e9c5fe0a360643a71eb1e8a
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved