CVE-2025-21662: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix variable not being completed when function returns When cmd_alloc_index(), fails cmd_work_handler() needs to complete ent->slotted before returning early. Otherwise the task which issued the command may hang: mlx5_core 0000:01:00.0: cmd_work_handler:877:(pid 3880418): failed to allocate command entry INFO: task kworker/13:2:4055883 blocked for more than 120 seconds. Not tainted 4.19.90-25.44.v2101.ky10.aarch64 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. kworker/13:2 D 0 4055883 2 0x00000228 Workqueue: events mlx5e_tx_dim_work [mlx5_core] Call trace: __switch_to+0xe8/0x150 __schedule+0x2a8/0x9b8 schedule+0x2c/0x88 schedule_timeout+0x204/0x478 wait_for_common+0x154/0x250 wait_for_completion+0x28/0x38 cmd_exec+0x7a0/0xa00 [mlx5_core] mlx5_cmd_exec+0x54/0x80 [mlx5_core] mlx5_core_modify_cq+0x6c/0x80 [mlx5_core] mlx5_core_modify_cq_moderation+0xa0/0xb8 [mlx5_core] mlx5e_tx_dim_work+0x54/0x68 [mlx5_core] process_one_work+0x1b0/0x448 worker_thread+0x54/0x468 kthread+0x134/0x138 ret_from_fork+0x10/0x18
AI Analysis
Technical Summary
CVE-2025-21662 is a vulnerability identified in the Linux kernel specifically within the Mellanox mlx5_core driver, which handles network interface cards (NICs) based on Mellanox hardware. The issue arises in the command handling logic of the mlx5 driver, particularly in the cmd_alloc_index() and cmd_work_handler() functions. When cmd_alloc_index() fails to allocate a command entry, cmd_work_handler() does not properly complete the associated synchronization variable ent->slotted before returning early. This improper handling causes the issuing task to hang indefinitely, as it waits for a completion event that never occurs. The kernel log snippet indicates that a worker thread (kworker) becomes blocked for more than 120 seconds, effectively causing a denial of service (DoS) condition on the affected system. The problem is rooted in the mlx5_core_modify_cq and mlx5_core_modify_cq_moderation functions, which are involved in modifying completion queues and their moderation parameters, critical for network packet processing. This bug can lead to kernel-level task hangs, impacting system responsiveness and network functionality. Although no known exploits are reported in the wild, the vulnerability can cause significant operational disruption, especially in environments relying on Mellanox NICs and the affected Linux kernel versions. The affected versions are identified by specific git commit hashes, indicating this is a low-level kernel code issue fixed in recent patches. The vulnerability does not require user interaction or authentication to trigger, as it occurs within kernel driver operations handling network commands.
Potential Impact
For European organizations, the impact of CVE-2025-21662 can be substantial, particularly for data centers, cloud providers, and enterprises using Linux servers equipped with Mellanox network adapters. The vulnerability can cause kernel worker threads to hang, leading to degraded network performance or complete network outages on affected hosts. This can disrupt critical services such as web hosting, cloud infrastructure, financial transaction processing, and telecommunications. Organizations relying on high-performance computing or storage networks using Mellanox hardware are especially at risk. The denial of service condition could also cascade in clustered or virtualized environments, affecting multiple services or tenants. Given the widespread use of Linux in European IT infrastructure, the vulnerability poses a risk to availability and operational continuity. While confidentiality and integrity are not directly impacted, the availability degradation can lead to financial losses, reputational damage, and regulatory compliance issues under frameworks like GDPR if service disruptions affect customer data access or processing.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory Linux systems using Mellanox mlx5 network drivers, focusing on kernel versions corresponding to the affected commit hashes. 2) Apply the latest Linux kernel patches that address CVE-2025-21662 as soon as they become available from trusted sources or vendor distributions. 3) For environments where immediate patching is not feasible, consider temporarily disabling or replacing affected Mellanox NICs with alternative hardware to prevent triggering the bug. 4) Monitor kernel logs for symptoms such as hung kworker threads or repeated cmd_work_handler failures indicating the issue. 5) Implement robust system monitoring and alerting to detect early signs of task hangs or network performance degradation. 6) Engage with hardware and Linux distribution vendors for guidance and support on patch deployment and validation. 7) Test patches in staging environments to ensure stability before production rollout, given the kernel-level nature of the fix. 8) Review and update incident response plans to include procedures for handling kernel-level hangs and network outages related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-21662: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix variable not being completed when function returns When cmd_alloc_index(), fails cmd_work_handler() needs to complete ent->slotted before returning early. Otherwise the task which issued the command may hang: mlx5_core 0000:01:00.0: cmd_work_handler:877:(pid 3880418): failed to allocate command entry INFO: task kworker/13:2:4055883 blocked for more than 120 seconds. Not tainted 4.19.90-25.44.v2101.ky10.aarch64 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. kworker/13:2 D 0 4055883 2 0x00000228 Workqueue: events mlx5e_tx_dim_work [mlx5_core] Call trace: __switch_to+0xe8/0x150 __schedule+0x2a8/0x9b8 schedule+0x2c/0x88 schedule_timeout+0x204/0x478 wait_for_common+0x154/0x250 wait_for_completion+0x28/0x38 cmd_exec+0x7a0/0xa00 [mlx5_core] mlx5_cmd_exec+0x54/0x80 [mlx5_core] mlx5_core_modify_cq+0x6c/0x80 [mlx5_core] mlx5_core_modify_cq_moderation+0xa0/0xb8 [mlx5_core] mlx5e_tx_dim_work+0x54/0x68 [mlx5_core] process_one_work+0x1b0/0x448 worker_thread+0x54/0x468 kthread+0x134/0x138 ret_from_fork+0x10/0x18
AI-Powered Analysis
Technical Analysis
CVE-2025-21662 is a vulnerability identified in the Linux kernel specifically within the Mellanox mlx5_core driver, which handles network interface cards (NICs) based on Mellanox hardware. The issue arises in the command handling logic of the mlx5 driver, particularly in the cmd_alloc_index() and cmd_work_handler() functions. When cmd_alloc_index() fails to allocate a command entry, cmd_work_handler() does not properly complete the associated synchronization variable ent->slotted before returning early. This improper handling causes the issuing task to hang indefinitely, as it waits for a completion event that never occurs. The kernel log snippet indicates that a worker thread (kworker) becomes blocked for more than 120 seconds, effectively causing a denial of service (DoS) condition on the affected system. The problem is rooted in the mlx5_core_modify_cq and mlx5_core_modify_cq_moderation functions, which are involved in modifying completion queues and their moderation parameters, critical for network packet processing. This bug can lead to kernel-level task hangs, impacting system responsiveness and network functionality. Although no known exploits are reported in the wild, the vulnerability can cause significant operational disruption, especially in environments relying on Mellanox NICs and the affected Linux kernel versions. The affected versions are identified by specific git commit hashes, indicating this is a low-level kernel code issue fixed in recent patches. The vulnerability does not require user interaction or authentication to trigger, as it occurs within kernel driver operations handling network commands.
Potential Impact
For European organizations, the impact of CVE-2025-21662 can be substantial, particularly for data centers, cloud providers, and enterprises using Linux servers equipped with Mellanox network adapters. The vulnerability can cause kernel worker threads to hang, leading to degraded network performance or complete network outages on affected hosts. This can disrupt critical services such as web hosting, cloud infrastructure, financial transaction processing, and telecommunications. Organizations relying on high-performance computing or storage networks using Mellanox hardware are especially at risk. The denial of service condition could also cascade in clustered or virtualized environments, affecting multiple services or tenants. Given the widespread use of Linux in European IT infrastructure, the vulnerability poses a risk to availability and operational continuity. While confidentiality and integrity are not directly impacted, the availability degradation can lead to financial losses, reputational damage, and regulatory compliance issues under frameworks like GDPR if service disruptions affect customer data access or processing.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory Linux systems using Mellanox mlx5 network drivers, focusing on kernel versions corresponding to the affected commit hashes. 2) Apply the latest Linux kernel patches that address CVE-2025-21662 as soon as they become available from trusted sources or vendor distributions. 3) For environments where immediate patching is not feasible, consider temporarily disabling or replacing affected Mellanox NICs with alternative hardware to prevent triggering the bug. 4) Monitor kernel logs for symptoms such as hung kworker threads or repeated cmd_work_handler failures indicating the issue. 5) Implement robust system monitoring and alerting to detect early signs of task hangs or network performance degradation. 6) Engage with hardware and Linux distribution vendors for guidance and support on patch deployment and validation. 7) Test patches in staging environments to ensure stability before production rollout, given the kernel-level nature of the fix. 8) Review and update incident response plans to include procedures for handling kernel-level hangs and network outages related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.732Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9820c4522896dcbdd2ca
Added to database: 5/21/2025, 9:08:48 AM
Last enriched: 6/27/2025, 11:12:02 PM
Last updated: 7/30/2025, 11:49:36 AM
Views: 12
Related Threats
CVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalCVE-2025-8675: CWE-918 Server-Side Request Forgery (SSRF) in Drupal AI SEO Link Advisor
MediumCVE-2025-8362: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal GoogleTag Manager
MediumCVE-2025-8361: CWE-962 Missing Authorization in Drupal Config Pages
HighCVE-2025-8092: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal COOKiES Consent Management
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.