CVE-2025-71066
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's ETS (Enhanced Transmission Selection) queuing discipline code. Specifically, it occurs between the functions ets_qdisc_dequeue and ets_qdisc_change, leading to a use-after-free (UAF) condition on a Qdisc (queueing discipline) object. The issue arises because some classes have their qdiscs set to NULL but remain in the active list, allowing an attacker with the capability to create new user and network namespaces to trigger this bug. The vulnerability is fixed by ensuring that classes are always removed from the active list before their associated qdiscs are deleted and freed.
How can this vulnerability impact me? :
This vulnerability can lead to a use-after-free condition, which may allow an attacker to execute arbitrary code or cause a denial of service by controlling the instruction pointer (RIP). Exploiting this requires the attacker to have the capability to create new user and network namespaces, which could lead to privilege escalation or system instability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can be attempted by monitoring the behavior of the 'ets' qdisc on the affected Linux kernel. The provided reproducer steps use 'tc' commands to add, change, and delete 'ets' qdiscs and filters on a network device, combined with high-frequency ping flooding to trigger the race condition. Suggested commands include: 'tc qdisc ls dev <DEV>' to list qdiscs, 'tc qdisc add dev <DEV> root handle <HANDLE> ets bands <num> strict <num>' to add ets qdisc, 'tc qdisc change dev <DEV> root handle <HANDLE> ets bands <num> strict <num>' to change ets qdisc, and monitoring for crashes or unusual behavior during these operations. The example uses 'ping -I <DEV> -f -c <count> -s <size> -W 0.001 <dst>' to generate traffic. These commands can help detect if the system is vulnerable by attempting to reproduce the issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by ensuring classes are always removed from the active list before deleting their associated qdisc. Until a patch is applied, avoid allowing untrusted users the capability to create new user and network namespaces, as this capability is required to trigger the bug. Additionally, refrain from using or modifying 'ets' qdiscs in a way that could trigger the race condition.