{"vulnerability": "CVE-2025-21703", "sightings": [{"uuid": "55cc6a95-4c1d-41cf-b103-4daf442f262b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21703", "type": "seen", "source": "https://t.me/cvedetector/18325", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21703 - Linux Kernel netem Use-After-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21703 \nPublished : Feb. 18, 2025, 3:15 p.m. | 29\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnetem: Update sch-&gt;q.qlen before qdisc_tree_reduce_backlog()  \n  \nqdisc_tree_reduce_backlog() notifies parent qdisc only if child  \nqdisc becomes empty, therefore we need to reduce the backlog of the  \nchild qdisc before calling it. Otherwise it would miss the opportunity  \nto call cops-&gt;qlen_notify(), in the case of DRR, it resulted in UAF  \nsince DRR uses -&gt;qlen_notify() to maintain its active list. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T16:48:53.000000Z"}, {"uuid": "2fc21cc9-b255-4418-9fbd-176cfe607037", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21703", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lihkmvo6452h", "content": "", "creation_timestamp": "2025-02-18T15:18:05.261362Z"}, {"uuid": "10a99e78-5738-4350-beb0-b3cb9a0ce64b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21703", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lii4enkqjc2j", "content": "", "creation_timestamp": "2025-02-18T20:35:37.791441Z"}, {"uuid": "c3330c8d-f4d5-4817-8d8a-aeb7a515f091", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21703", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4890", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21703\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnetem: Update sch-&gt;q.qlen before qdisc_tree_reduce_backlog()\n\nqdisc_tree_reduce_backlog() notifies parent qdisc only if child\nqdisc becomes empty, therefore we need to reduce the backlog of the\nchild qdisc before calling it. Otherwise it would miss the opportunity\nto call cops-&gt;qlen_notify(), in the case of DRR, it resulted in UAF\nsince DRR uses -&gt;qlen_notify() to maintain its active list.\n\ud83d\udccf Published: 2025-02-18T14:37:44.261Z\n\ud83d\udccf Modified: 2025-02-21T13:45:22.563Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/7b79ca9a1de6a428d486ff52fb3d602321c08f55\n2. https://git.kernel.org/stable/c/1f8e3f4a4b8b90ad274dfbc66fc7d55cb582f4d5\n3. https://git.kernel.org/stable/c/6312555249082d6d8cc5321ff725df05482d8b83\n4. https://git.kernel.org/stable/c/839ecc583fa00fab785fde1c85a326743657fd32\n5. https://git.kernel.org/stable/c/638ba5089324796c2ee49af10427459c2de35f71", "creation_timestamp": "2025-02-21T14:18:28.000000Z"}]}