109 Star 72 Fork 300

src-openEuler/kernel

CVE-2025-21971

Doing
CVE和安全问题 owner
Opened this issue  
2025-04-02 01:01

一、漏洞信息
漏洞编号:CVE-2025-21971
漏洞归属组件:kernel
漏洞归属的版本:4.19.140,4.19.194,4.19.90,5.10.0,6.1.19,6.4.0,6.6.0
CVSS V3.0分值:
BaseScore:N/A None
Vector:CVSS:3.0/
漏洞简述:
In the Linux kernel, the following vulnerability has been resolved:net_sched: Prevent creation of classes with TC_H_ROOTThe function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a terminationcondition when traversing up the qdisc tree to update parent backlogcounters. However, if a class is created with classid TC_H_ROOT, thetraversal terminates prematurely at this class instead of reaching theactual root qdisc, causing parent statistics to be incorrectly maintained.In case of DRR, this could lead to a crash as reported by Mingi Cho.Prevent the creation of any Qdisc class with classid TC_H_ROOT(0xFFFFFFFF) across all qdisc types, as suggested by Jamal.
漏洞公开时间:2025-04-02 00:15:28
漏洞创建时间:2025-04-02 01:01:09
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2025-21971

更多参考(点击展开)
参考来源 参考链接 来源链接
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/003d92c91cdb5a64b25a9a74cb8543aac9a8bb48
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/0c3057a5a04d07120b3d0ec9c79568fceb9c921e
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/5c3ca9cb48b51bd72bf76b8b05e24f3cd53db5e7
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/78533c4a29ac3aeddce4b481770beaaa4f3bfb67
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/7a82fe67a9f4d7123d8e5ba8f0f0806c28695006
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/94edfdfb9505ab608e86599d1d1e38c83816fc1c
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/e05d9938b1b0ac40b6054cc5fa0ccbd9afd5ed4c
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/e5ee00607bbfc97ef1526ea95b6b2458ac9e7cb7
suse_bugzilla http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2025-21971 https://bugzilla.suse.com/show_bug.cgi?id=1240799
suse_bugzilla https://www.cve.org/CVERecord?id=CVE-2025-21971 https://bugzilla.suse.com/show_bug.cgi?id=1240799
suse_bugzilla https://git.kernel.org/stable/c/0c3057a5a04d07120b3d0ec9c79568fceb9c921e https://bugzilla.suse.com/show_bug.cgi?id=1240799
suse_bugzilla https://git.kernel.org/stable/c/5c3ca9cb48b51bd72bf76b8b05e24f3cd53db5e7 https://bugzilla.suse.com/show_bug.cgi?id=1240799
suse_bugzilla https://git.kernel.org/stable/c/78533c4a29ac3aeddce4b481770beaaa4f3bfb67 https://bugzilla.suse.com/show_bug.cgi?id=1240799
suse_bugzilla https://git.kernel.org/stable/c/94edfdfb9505ab608e86599d1d1e38c83816fc1c https://bugzilla.suse.com/show_bug.cgi?id=1240799
suse_bugzilla https://git.kernel.org/stable/c/e5ee00607bbfc97ef1526ea95b6b2458ac9e7cb7 https://bugzilla.suse.com/show_bug.cgi?id=1240799
suse_bugzilla https://bugzilla.redhat.com/show_bug.cgi?id=2356598 https://bugzilla.suse.com/show_bug.cgi?id=1240799
suse_bugzilla https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2025/CVE-2025-21971.mbox https://bugzilla.suse.com/show_bug.cgi?id=1240799
anolis https://anas.openanolis.cn/cves/detail/CVE-2025-21971
mageia http://advisories.mageia.org/MGASA-2025-0142.html
osv https://git.kernel.org/stable/c/003d92c91cdb5a64b25a9a74cb8543aac9a8bb48 https://osv.dev/vulnerability/CVE-2025-21971
osv https://git.kernel.org/stable/c/0c3057a5a04d07120b3d0ec9c79568fceb9c921e https://osv.dev/vulnerability/CVE-2025-21971
osv https://git.kernel.org/stable/c/5c3ca9cb48b51bd72bf76b8b05e24f3cd53db5e7 https://osv.dev/vulnerability/CVE-2025-21971
osv https://git.kernel.org/stable/c/78533c4a29ac3aeddce4b481770beaaa4f3bfb67 https://osv.dev/vulnerability/CVE-2025-21971
osv https://git.kernel.org/stable/c/7a82fe67a9f4d7123d8e5ba8f0f0806c28695006 https://osv.dev/vulnerability/CVE-2025-21971
osv https://git.kernel.org/stable/c/94edfdfb9505ab608e86599d1d1e38c83816fc1c https://osv.dev/vulnerability/CVE-2025-21971
osv https://git.kernel.org/stable/c/e05d9938b1b0ac40b6054cc5fa0ccbd9afd5ed4c https://osv.dev/vulnerability/CVE-2025-21971
osv https://git.kernel.org/stable/c/e5ee00607bbfc97ef1526ea95b6b2458ac9e7cb7 https://osv.dev/vulnerability/CVE-2025-21971
osv https://security-tracker.debian.org/tracker/CVE-2025-21971 https://osv.dev/vulnerability/CVE-2025-21971

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
openBrain开源漏洞感知系统
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
linux_kernel 6.1.132 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=e5ee00607bbfc97ef1526ea95b6b2458ac9e7cb7Issue https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=066a3b5b2346febf9a655b444567b7138e3bb939 linuxkernelcves
linux_kernel 6.6.84 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=78533c4a29ac3aeddce4b481770beaaa4f3bfb67Issue https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=066a3b5b2346febf9a655b444567b7138e3bb939 linuxkernelcves
linux_kernel 6.12.20 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=5c3ca9cb48b51bd72bf76b8b05e24f3cd53db5e7Issue https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=066a3b5b2346febf9a655b444567b7138e3bb939 linuxkernelcves
linux_kernel 6.13.8 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=94edfdfb9505ab608e86599d1d1e38c83816fc1cIssue https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=066a3b5b2346febf9a655b444567b7138e3bb939 linuxkernelcves
linux_kernel 6.14 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0c3057a5a04d07120b3d0ec9c79568fceb9c921ePlease https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=066a3b5b2346febf9a655b444567b7138e3bb939 linuxkernelcves

二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:net_sched: Prevent creation of classes with TC_H_ROOTThe function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a terminationcondition when traversing up the qdisc tree to update parent backlogcounters. However, if a class is created with classid TC_H_ROOT, thetraversal terminates prematurely at this class instead of reaching theactual root qdisc, causing parent statistics to be incorrectly maintained.In case of DRR, this could lead to a crash as reported by Mingi Cho.Prevent the creation of any Qdisc class with classid TC_H_ROOT(0xFFFFFFFF) across all qdisc types, as suggested by Jamal.
openEuler评分:
5.5
Vector:CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP4(4.19.90):受影响
2.openEuler-22.03-LTS-SP3(5.10.0):受影响
3.openEuler-22.03-LTS-SP4(5.10.0):受影响
4.openEuler-24.03-LTS(6.6.0):受影响
5.openEuler-24.03-LTS-SP1(6.6.0):受影响
6.openEuler-24.03-LTS-SP2(6.6.0):受影响
7.master(6.6.0):不受影响
8.openEuler-24.03-LTS-Next(6.6.0):不受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP4(4.19.90):否
2.openEuler-22.03-LTS-SP3(5.10.0):否
3.master(6.6.0):否
4.openEuler-24.03-LTS(6.6.0):否
5.openEuler-24.03-LTS-Next(6.6.0):否
6.openEuler-22.03-LTS-SP4(5.10.0):否
7.openEuler-24.03-LTS-SP1(6.6.0):否
8.openEuler-24.03-LTS-SP2(6.6.0):否

原因说明:
1.openEuler-24.03-LTS(6.6.0):正常修复
2.openEuler-24.03-LTS-SP1(6.6.0):正常修复
3.openEuler-24.03-LTS-SP2(6.6.0):正常修复
4.openEuler-20.03-LTS-SP4(4.19.90):不修复-超出修复范围
5.openEuler-22.03-LTS-SP3(5.10.0):不修复-超出修复范围
6.openEuler-22.03-LTS-SP4(5.10.0):不修复-超出修复范围
7.master(6.6.0):不受影响-漏洞代码不能被攻击者触发
8.openEuler-24.03-LTS-Next(6.6.0):不受影响-漏洞代码不能被攻击者触发

Comments (11)

openeuler-ci-bot createdCVE和安全问题 2 months ago
openeuler-ci-bot added
 
CVE/UNFIXED
label
2 months ago
Expand operation logs

Hi openeuler-ci-bot, welcome to the openEuler Community.
I'm the Bot here serving you. You can find the instructions on how to interact with me at Here.
If you have any questions, please contact the SIG: Kernel, and any of the maintainers.

openeuler-ci-bot added
 
sig/Kernel
label
2 months ago
参考网址 关联pr 状态 补丁链接
https://nvd.nist.gov/vuln/detail/CVE-2025-21971NoneNonehttps://git.kernel.org/stable/c/78533c4a29ac3aeddce4b481770beaaa4f3bfb67
https://git.kernel.org/stable/c/e5ee00607bbfc97ef1526ea95b6b2458ac9e7cb7
https://git.kernel.org/stable/c/5c3ca9cb48b51bd72bf76b8b05e24f3cd53db5e7
https://git.kernel.org/stable/c/94edfdfb9505ab608e86599d1d1e38c83816fc1c
https://git.kernel.org/stable/c/0c3057a5a04d07120b3d0ec9c79568fceb9c921e
https://ubuntu.com/security/CVE-2025-21971NoneNonehttps://discourse.ubuntu.com/c/project
https://www.opencve.io/cve/CVE-2025-21971NoneNonehttps://git.kernel.org/stable/c/78533c4a29ac3aeddce4b481770beaaa4f3bfb67
https://git.kernel.org/stable/c/e5ee00607bbfc97ef1526ea95b6b2458ac9e7cb7
https://git.kernel.org/stable/c/5c3ca9cb48b51bd72bf76b8b05e24f3cd53db5e7
https://git.kernel.org/stable/c/94edfdfb9505ab608e86599d1d1e38c83816fc1c
https://git.kernel.org/stable/c/0c3057a5a04d07120b3d0ec9c79568fceb9c921e
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2025-21971
https://security-tracker.debian.org/tracker/CVE-2025-21971
http://www.cnnvd.org.cn/web/vulnerability/queryLds.tag?qcvCnnvdid=CVE-2025-21971

说明:补丁链接仅供初步排查参考,实际可用性请人工再次确认,补丁下载验证可使用CVE补丁工具
若补丁不准确,烦请在此issue下评论 '/report-patch 参考网址 补丁链接1,补丁链接2' 反馈正确信息,便于我们不断优化工具,不胜感激。
如 /report-patch https://security-tracker.debian.org/tracker/CVE-2021-3997 https://github.com/systemd/systemd/commit/5b1cf7a9be37e20133c0208005274ce4a5b5c6a1

openeuler-ci-bot changed description 2 months ago
openeuler-ci-bot changed description 2 months ago

CVE-2025-21971

影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:

net_sched: Prevent creation of classes with TC_H_ROOT

The function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination
condition when traversing up the qdisc tree to update parent backlog
counters. However, if a class is created with classid TC_H_ROOT, the
traversal terminates prematurely at this class instead of reaching the
actual root qdisc, causing parent statistics to be incorrectly maintained.
In case of DRR, this could lead to a crash as reported by Mingi Cho.

Prevent the creation of any Qdisc class with classid TC_H_ROOT
(0xFFFFFFFF) across all qdisc types, as suggested by Jamal.

The Linux kernel CVE team has assigned CVE-2025-21971 to this issue.

openEuler评分:(评分和向量)
3.9
AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L

受影响版本排查(受影响/不受影响):
1.master(6.1.0):不受影响
2.openEuler-20.03-LTS-SP4:不受影响
3.openEuler-22.03-LTS-SP3:受影响
4.openEuler-22.03-LTS-SP4:受影响
5.openEuler-24.03-LTS:受影响
6.openEuler-24.03-LTS-Next:不受影响
7.openEuler-24.03-LTS-SP1:受影响

修复是否涉及abi变化(是/否):
1.master(6.1.0):否
2.openEuler-20.03-LTS-SP4:否
3.openEuler-22.03-LTS-SP3:否
4.openEuler-22.03-LTS-SP4:否
5.openEuler-24.03-LTS:否
6.openEuler-24.03-LTS-Next:否
7.openEuler-24.03-LTS-SP1:否

原因说明:
1.master(23.08.5):不受影响-漏洞代码不能被攻击者触发
2.openEuler-20.03-LTS-SP4:不受影响-漏洞代码不能被攻击者触发
4.openEuler-22.03-LTS-SP3:不修复-超出修复范围
5.openEuler-22.03-LTS-SP4:不修复-超出修复范围
6.openEuler-24.03-LTS:正常修复
7.openEuler-24.03-LTS-Next:不受影响-漏洞代码不能被攻击者触发
8.openEuler-24.03-LTS-SP1:正常修复

openeuler-ci-bot changed description 2 months ago
openeuler-ci-bot changed issue state from 待办的 to 进行中 2 months ago

CVE-2025-21971

影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:

net_sched: Prevent creation of classes with TC_H_ROOT

The function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination
condition when traversing up the qdisc tree to update parent backlog
counters. However, if a class is created with classid TC_H_ROOT, the
traversal terminates prematurely at this class instead of reaching the
actual root qdisc, causing parent statistics to be incorrectly maintained.
In case of DRR, this could lead to a crash as reported by Mingi Cho.

Prevent the creation of any Qdisc class with classid TC_H_ROOT
(0xFFFFFFFF) across all qdisc types, as suggested by Jamal.

The Linux kernel CVE team has assigned CVE-2025-21971 to this issue.

openEuler评分:(评分和向量)
3.9
AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L

受影响版本排查(受影响/不受影响):
1.master(6.1.0):不受影响
2.openEuler-20.03-LTS-SP4:不受影响
3.openEuler-22.03-LTS-SP3:受影响
4.openEuler-22.03-LTS-SP4:受影响
5.openEuler-24.03-LTS:受影响
6.openEuler-24.03-LTS-Next:不受影响
7.openEuler-24.03-LTS-SP1:受影响

修复是否涉及abi变化(是/否):
1.master(6.1.0):否
2.openEuler-20.03-LTS-SP4:否
3.openEuler-22.03-LTS-SP3:否
4.openEuler-22.03-LTS-SP4:否
5.openEuler-24.03-LTS:否
6.openEuler-24.03-LTS-Next:否
7.openEuler-24.03-LTS-SP1:否

原因说明:
1.master(23.08.5):不受影响-漏洞代码不能被攻击者触发
2.openEuler-20.03-LTS-SP4:不受影响-漏洞代码不能被攻击者触发
4.openEuler-22.03-LTS-SP3:不修复-超出修复范围
5.openEuler-22.03-LTS-SP4:不修复-超出修复范围
6.openEuler-24.03-LTS:正常修复
7.openEuler-24.03-LTS-Next:不受影响-漏洞代码不能被攻击者触发
8.openEuler-24.03-LTS-SP1:正常修复

openeuler-ci-bot changed description 2 months ago
openeuler-ci-bot changed description 2 months ago

CVE-2025-21971

影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:

net_sched: Prevent creation of classes with TC_H_ROOT

The function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination
condition when traversing up the qdisc tree to update parent backlog
counters. However, if a class is created with classid TC_H_ROOT, the
traversal terminates prematurely at this class instead of reaching the
actual root qdisc, causing parent statistics to be incorrectly maintained.
In case of DRR, this could lead to a crash as reported by Mingi Cho.

Prevent the creation of any Qdisc class with classid TC_H_ROOT
(0xFFFFFFFF) across all qdisc types, as suggested by Jamal.

openEuler评分:(评分和向量)
3.9
CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L

受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP4:受影响
2.openEuler-22.03-LTS-SP3:受影响
3.openEuler-22.03-LTS-SP4:受影响
4.master(6.6.0):不受影响
5.openEuler-24.03-LTS:受影响
6.openEuler-24.03-LTS-Next:不受影响
7.openEuler-24.03-LTS-SP1:受影响
8.openEuler-24.03-LTS-SP2:受影响

原因说明:
1.openEuler-20.03-LTS-SP4:不修复-超出修复范围
2.openEuler-22.03-LTS-SP3:不修复-超出修复范围
3.openEuler-22.03-LTS-SP4:不修复-超出修复范围
4.master(6.6.0):不受影响-漏洞代码不能被攻击者触发
5.openEuler-24.03-LTS:正常修复
6.openEuler-24.03-LTS-Next:不受影响-漏洞代码不能被攻击者触发
7.openEuler-24.03-LTS-SP1:正常修复
8.openEuler-24.03-LTS-SP2:正常修复

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP4:否
2.openEuler-22.03-LTS-SP3:否
3.master(23.08.5):否
4.openEuler-24.03-LTS:否
5.openEuler-24.03-LTS-Next:否
6.openEuler-22.03-LTS-SP4:否
7.openEuler-24.03-LTS-SP1:否
8.openEuler-24.03-LTS-SP2:否

===========================================================

openeuler-ci-bot changed description 2 months ago

CVE-2025-21971

影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:

net_sched: Prevent creation of classes with TC_H_ROOT

The function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination
condition when traversing up the qdisc tree to update parent backlog
counters. However, if a class is created with classid TC_H_ROOT, the
traversal terminates prematurely at this class instead of reaching the
actual root qdisc, causing parent statistics to be incorrectly maintained.
In case of DRR, this could lead to a crash as reported by Mingi Cho.

Prevent the creation of any Qdisc class with classid TC_H_ROOT
(0xFFFFFFFF) across all qdisc types, as suggested by Jamal.

openEuler评分:(评分和向量)
5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP4:受影响
2.openEuler-22.03-LTS-SP3:受影响
3.openEuler-22.03-LTS-SP4:受影响
4.master(6.6.0):不受影响
5.openEuler-24.03-LTS:受影响
6.openEuler-24.03-LTS-Next:不受影响
7.openEuler-24.03-LTS-SP1:受影响
8.openEuler-24.03-LTS-SP2:受影响

原因说明:
1.openEuler-20.03-LTS-SP4:不修复-超出修复范围
2.openEuler-22.03-LTS-SP3:不修复-超出修复范围
3.openEuler-22.03-LTS-SP4:不修复-超出修复范围
4.master(6.6.0):不受影响-漏洞代码不能被攻击者触发
5.openEuler-24.03-LTS:正常修复
6.openEuler-24.03-LTS-Next:不受影响-漏洞代码不能被攻击者触发
7.openEuler-24.03-LTS-SP1:正常修复
8.openEuler-24.03-LTS-SP2:正常修复

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP4:否
2.openEuler-22.03-LTS-SP3:否
3.master(23.08.5):否
4.openEuler-24.03-LTS:否
5.openEuler-24.03-LTS-Next:否
6.openEuler-22.03-LTS-SP4:否
7.openEuler-24.03-LTS-SP1:否
8.openEuler-24.03-LTS-SP2:否

===========================================================

openeuler-ci-bot changed description 2 months ago
openeuler-ci-bot changed description a month ago
openeuler-ci-bot changed description a month ago

Sign in to comment

Status
Assignees
Projects
Pull Requests
Successfully merging a pull request will close this issue.
Duration (hours)
Planed to start   -   Planed to end
-
Top level
Priority
Milestones
Branches
参与者(3)
5329419 openeuler ci bot 1632792936 hulk-robot-zhixiuzhou 郭梦琪-guo-mengqi
1
https://gitee.com/src-openeuler/kernel.git
git@gitee.com:src-openeuler/kernel.git
src-openeuler
kernel
kernel

Search