CVE-2025-21651: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: hns3: don't auto enable misc vector Currently, there is a time window between misc irq enabled and service task inited. If an interrupte is reported at this time, it will cause warning like below: [ 16.324639] Call trace: [ 16.324641] __queue_delayed_work+0xb8/0xe0 [ 16.324643] mod_delayed_work_on+0x78/0xd0 [ 16.324655] hclge_errhand_task_schedule+0x58/0x90 [hclge] [ 16.324662] hclge_misc_irq_handle+0x168/0x240 [hclge] [ 16.324666] __handle_irq_event_percpu+0x64/0x1e0 [ 16.324667] handle_irq_event+0x80/0x170 [ 16.324670] handle_fasteoi_edge_irq+0x110/0x2bc [ 16.324671] __handle_domain_irq+0x84/0xfc [ 16.324673] gic_handle_irq+0x88/0x2c0 [ 16.324674] el1_irq+0xb8/0x140 [ 16.324677] arch_cpu_idle+0x18/0x40 [ 16.324679] default_idle_call+0x5c/0x1bc [ 16.324682] cpuidle_idle_call+0x18c/0x1c4 [ 16.324684] do_idle+0x174/0x17c [ 16.324685] cpu_startup_entry+0x30/0x6c [ 16.324687] secondary_start_kernel+0x1a4/0x280 [ 16.324688] ---[ end trace 6aa0bff672a964aa ]--- So don't auto enable misc vector when request irq..
AI Analysis
Technical Summary
CVE-2025-21651 is a vulnerability identified in the Linux kernel, specifically within the network driver subsystem related to the hns3 driver, which is used for certain network interface cards (NICs). The issue arises from a timing window between the enabling of the miscellaneous interrupt request (IRQ) vector and the initialization of the service task responsible for handling these interrupts. During this window, if an interrupt is triggered, it can cause kernel warnings and potentially unstable behavior, as evidenced by the call trace logs showing functions like __queue_delayed_work, mod_delayed_work_on, and hclge_misc_irq_handle involved in the error path. The root cause is that the misc vector is auto-enabled prematurely when requesting the IRQ, leading to interrupts being handled before the system is fully ready. The fix involves preventing the automatic enabling of the misc vector during IRQ request, ensuring that interrupts are only processed once the service task is properly initialized. Although this vulnerability does not currently have known exploits in the wild, it represents a kernel-level race condition that could lead to system instability or denial of service if triggered. The affected versions are identified by specific commit hashes, indicating that this is a recent and targeted fix in the Linux kernel source code. No CVSS score has been assigned yet, and no direct evidence suggests privilege escalation or remote code execution, but the vulnerability impacts kernel interrupt handling reliability.
Potential Impact
For European organizations, the impact of CVE-2025-21651 primarily concerns system stability and availability, especially for those relying on Linux servers with network hardware using the hns3 driver. This includes data centers, cloud service providers, telecommunications infrastructure, and enterprises running critical network services on Linux. An unexpected kernel warning or crash caused by this race condition could lead to service interruptions, affecting business continuity and potentially causing downtime. While this vulnerability does not appear to directly compromise confidentiality or integrity, denial of service conditions at the kernel level can disrupt operations and lead to cascading failures in dependent services. Organizations with high availability requirements or those operating in regulated sectors (finance, healthcare, critical infrastructure) may face compliance and operational risks if their Linux systems are affected. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to prevent future exploitation or accidental system failures.
Mitigation Recommendations
To mitigate CVE-2025-21651, organizations should: 1) Apply the latest Linux kernel patches that include the fix preventing auto-enabling of the misc IRQ vector in the hns3 driver. Since the vulnerability is tied to specific kernel commits, tracking kernel updates from trusted sources (e.g., official Linux kernel repositories or vendor distributions) is critical. 2) Conduct thorough testing of updated kernels in staging environments to ensure compatibility with existing network hardware and software stacks. 3) Monitor kernel logs for warning messages similar to those described in the vulnerability report to detect any residual or related issues. 4) For environments where immediate patching is not feasible, consider isolating or limiting the use of affected network interfaces or drivers, or deploying compensating controls such as redundant network paths to minimize impact from potential service disruptions. 5) Maintain an inventory of hardware using the hns3 driver to prioritize patch deployment. 6) Engage with hardware vendors and Linux distribution maintainers to confirm the availability and applicability of patches for specific kernel versions in use.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-21651: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: hns3: don't auto enable misc vector Currently, there is a time window between misc irq enabled and service task inited. If an interrupte is reported at this time, it will cause warning like below: [ 16.324639] Call trace: [ 16.324641] __queue_delayed_work+0xb8/0xe0 [ 16.324643] mod_delayed_work_on+0x78/0xd0 [ 16.324655] hclge_errhand_task_schedule+0x58/0x90 [hclge] [ 16.324662] hclge_misc_irq_handle+0x168/0x240 [hclge] [ 16.324666] __handle_irq_event_percpu+0x64/0x1e0 [ 16.324667] handle_irq_event+0x80/0x170 [ 16.324670] handle_fasteoi_edge_irq+0x110/0x2bc [ 16.324671] __handle_domain_irq+0x84/0xfc [ 16.324673] gic_handle_irq+0x88/0x2c0 [ 16.324674] el1_irq+0xb8/0x140 [ 16.324677] arch_cpu_idle+0x18/0x40 [ 16.324679] default_idle_call+0x5c/0x1bc [ 16.324682] cpuidle_idle_call+0x18c/0x1c4 [ 16.324684] do_idle+0x174/0x17c [ 16.324685] cpu_startup_entry+0x30/0x6c [ 16.324687] secondary_start_kernel+0x1a4/0x280 [ 16.324688] ---[ end trace 6aa0bff672a964aa ]--- So don't auto enable misc vector when request irq..
AI-Powered Analysis
Technical Analysis
CVE-2025-21651 is a vulnerability identified in the Linux kernel, specifically within the network driver subsystem related to the hns3 driver, which is used for certain network interface cards (NICs). The issue arises from a timing window between the enabling of the miscellaneous interrupt request (IRQ) vector and the initialization of the service task responsible for handling these interrupts. During this window, if an interrupt is triggered, it can cause kernel warnings and potentially unstable behavior, as evidenced by the call trace logs showing functions like __queue_delayed_work, mod_delayed_work_on, and hclge_misc_irq_handle involved in the error path. The root cause is that the misc vector is auto-enabled prematurely when requesting the IRQ, leading to interrupts being handled before the system is fully ready. The fix involves preventing the automatic enabling of the misc vector during IRQ request, ensuring that interrupts are only processed once the service task is properly initialized. Although this vulnerability does not currently have known exploits in the wild, it represents a kernel-level race condition that could lead to system instability or denial of service if triggered. The affected versions are identified by specific commit hashes, indicating that this is a recent and targeted fix in the Linux kernel source code. No CVSS score has been assigned yet, and no direct evidence suggests privilege escalation or remote code execution, but the vulnerability impacts kernel interrupt handling reliability.
Potential Impact
For European organizations, the impact of CVE-2025-21651 primarily concerns system stability and availability, especially for those relying on Linux servers with network hardware using the hns3 driver. This includes data centers, cloud service providers, telecommunications infrastructure, and enterprises running critical network services on Linux. An unexpected kernel warning or crash caused by this race condition could lead to service interruptions, affecting business continuity and potentially causing downtime. While this vulnerability does not appear to directly compromise confidentiality or integrity, denial of service conditions at the kernel level can disrupt operations and lead to cascading failures in dependent services. Organizations with high availability requirements or those operating in regulated sectors (finance, healthcare, critical infrastructure) may face compliance and operational risks if their Linux systems are affected. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to prevent future exploitation or accidental system failures.
Mitigation Recommendations
To mitigate CVE-2025-21651, organizations should: 1) Apply the latest Linux kernel patches that include the fix preventing auto-enabling of the misc IRQ vector in the hns3 driver. Since the vulnerability is tied to specific kernel commits, tracking kernel updates from trusted sources (e.g., official Linux kernel repositories or vendor distributions) is critical. 2) Conduct thorough testing of updated kernels in staging environments to ensure compatibility with existing network hardware and software stacks. 3) Monitor kernel logs for warning messages similar to those described in the vulnerability report to detect any residual or related issues. 4) For environments where immediate patching is not feasible, consider isolating or limiting the use of affected network interfaces or drivers, or deploying compensating controls such as redundant network paths to minimize impact from potential service disruptions. 5) Maintain an inventory of hardware using the hns3 driver to prioritize patch deployment. 6) Engage with hardware vendors and Linux distribution maintainers to confirm the availability and applicability of patches for specific kernel versions in use.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.728Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9834c4522896dcbe9734
Added to database: 5/21/2025, 9:09:08 AM
Last enriched: 6/30/2025, 4:27:39 PM
Last updated: 7/31/2025, 10:17:40 AM
Views: 11
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.