Skip to main content

CVE-2025-21650: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-21650cvecve-2025-21650
Published: Sun Jan 19 2025 (01/19/2025, 10:18:07 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue The TQP BAR space is divided into two segments. TQPs 0-1023 and TQPs 1024-1279 are in different BAR space addresses. However, hclge_fetch_pf_reg does not distinguish the tqp space information when reading the tqp space information. When the number of TQPs is greater than 1024, access bar space overwriting occurs. The problem of different segments has been considered during the initialization of tqp.io_base. Therefore, tqp.io_base is directly used when the queue is read in hclge_fetch_pf_reg. The error message: Unable to handle kernel paging request at virtual address ffff800037200000 pc : hclge_fetch_pf_reg+0x138/0x250 [hclge] lr : hclge_get_regs+0x84/0x1d0 [hclge] Call trace: hclge_fetch_pf_reg+0x138/0x250 [hclge] hclge_get_regs+0x84/0x1d0 [hclge] hns3_get_regs+0x2c/0x50 [hns3] ethtool_get_regs+0xf4/0x270 dev_ethtool+0x674/0x8a0 dev_ioctl+0x270/0x36c sock_do_ioctl+0x110/0x2a0 sock_ioctl+0x2ac/0x530 __arm64_sys_ioctl+0xa8/0x100 invoke_syscall+0x4c/0x124 el0_svc_common.constprop.0+0x140/0x15c do_el0_svc+0x30/0xd0 el0_svc+0x1c/0x2c el0_sync_handler+0xb0/0xb4 el0_sync+0x168/0x180

AI-Powered Analysis

AILast updated: 06/27/2025, 23:11:10 UTC

Technical Analysis

CVE-2025-21650 is a vulnerability identified in the Linux kernel's hns3 network driver, specifically within the hclge_fetch_pf_reg function. The issue arises from improper handling of the TQP (Transmit Queue Pair) BAR (Base Address Register) space segmentation. The TQP BAR space is divided into two segments: TQPs 0-1023 and TQPs 1024-1279, each mapped to different BAR space addresses. However, the vulnerable function does not correctly distinguish between these segments when accessing TQP space information. When the number of TQPs exceeds 1024, the function accesses the BAR space out of bounds, leading to memory corruption. This can cause a kernel paging request fault, resulting in a kernel crash or denial of service. The vulnerability manifests as an invalid memory access, as evidenced by the kernel panic trace involving hclge_fetch_pf_reg and related functions. The root cause is that although the initialization of tqp.io_base accounts for the segmentation, the function hclge_fetch_pf_reg directly uses tqp.io_base without segment differentiation during reads. This flaw can be triggered when the system has a high number of TQPs configured, which is typical in high-performance network environments. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects specific Linux kernel versions identified by commit hashes, indicating it is present in certain kernel builds prior to the fix. The issue is primarily a memory safety bug that can lead to system instability or denial of service but does not inherently provide privilege escalation or code execution vectors based on the provided information.

Potential Impact

For European organizations, the impact of CVE-2025-21650 can be significant, especially for enterprises and data centers relying on Linux servers with high-performance networking hardware using the hns3 driver. The vulnerability can cause kernel crashes leading to denial of service, which may disrupt critical network services, cloud infrastructure, and telecommunications systems. Organizations in sectors such as finance, healthcare, telecommunications, and government, which often deploy Linux-based infrastructure with advanced networking capabilities, may experience service outages or degraded performance. Although there is no evidence of remote code execution or privilege escalation, the denial of service could be exploited by attackers to disrupt operations or as part of a larger attack chain. The lack of known exploits suggests limited immediate risk, but the vulnerability should be addressed promptly to avoid future exploitation. Additionally, the complexity of the issue means that only systems with specific hardware and configurations (high TQP counts) are vulnerable, somewhat limiting the scope but not eliminating risk for affected deployments.

Mitigation Recommendations

To mitigate CVE-2025-21650, European organizations should: 1) Identify and inventory Linux systems using the hns3 network driver, particularly those with high TQP configurations (greater than 1024). 2) Apply the official Linux kernel patches or updates that address this vulnerability as soon as they become available from trusted sources or Linux distribution vendors. 3) If immediate patching is not possible, consider reducing the number of TQPs configured to below 1024 to avoid triggering the out-of-bounds access. 4) Monitor system logs and kernel messages for signs of the described kernel paging faults or crashes related to hclge_fetch_pf_reg. 5) Implement robust kernel crash recovery and failover mechanisms to minimize service disruption in case of exploitation. 6) Engage with hardware vendors to ensure firmware and driver compatibility with patched kernels. 7) Maintain strict access controls and monitoring on systems with this driver to detect any anomalous activity that could indicate exploitation attempts. These steps go beyond generic advice by focusing on configuration adjustments and proactive monitoring tailored to the vulnerability's specifics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.728Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdd2c2

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 6/27/2025, 11:11:10 PM

Last updated: 8/17/2025, 3:55:54 AM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats