Skip to main content

CVE-2025-21690: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-21690cvecve-2025-21690
Published: Mon Feb 10 2025 (02/10/2025, 15:58:46 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service If there's a persistent error in the hypervisor, the SCSI warning for failed I/O can flood the kernel log and max out CPU utilization, preventing troubleshooting from the VM side. Ratelimit the warning so it doesn't DoS the VM.

AI-Powered Analysis

AILast updated: 06/30/2025, 17:29:53 UTC

Technical Analysis

CVE-2025-21690 addresses a vulnerability in the Linux kernel specifically within the SCSI subsystem's storvsc driver, which is used for storage virtualization in Hyper-V environments. The issue arises when there is a persistent error condition in the hypervisor layer causing repeated failed I/O operations. Each failure triggers a warning log entry in the kernel. Without proper rate limiting, these warning messages can flood the kernel logs, leading to excessive CPU utilization within the virtual machine (VM). This excessive logging can effectively cause a denial of service (DoS) condition by maxing out CPU resources, thereby preventing the VM from performing normal operations and hindering troubleshooting efforts from within the VM. The vulnerability is rooted in the lack of rate limiting on these warning logs, which allows an attacker or a faulty hypervisor to induce a log flood. The fix implemented involves introducing rate limiting on these warning messages to prevent the kernel log from being overwhelmed and to maintain CPU availability for other processes. This vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, indicating a specific patch or code state. No known exploits are reported in the wild as of the publication date, and no CVSS score has been assigned yet. The vulnerability is significant in virtualized environments using Hyper-V with Linux guests, where storage I/O errors could be weaponized to degrade VM performance or availability.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in virtualized environments running Linux guests on Microsoft Hyper-V hypervisors. Many enterprises, cloud providers, and service providers in Europe utilize Hyper-V for virtualization, often hosting critical workloads on Linux VMs. An attacker or malfunctioning hypervisor component causing persistent SCSI I/O errors could trigger excessive kernel logging, leading to CPU exhaustion and denial of service within the VM. This could disrupt business-critical applications, degrade service availability, and complicate incident response due to impaired troubleshooting capabilities. The impact is particularly relevant for sectors with high reliance on virtualized infrastructure such as finance, telecommunications, and public administration. While the vulnerability does not directly expose data confidentiality or integrity, the availability impact can be severe, potentially causing downtime or degraded performance. Additionally, the inability to effectively troubleshoot from within the VM could delay remediation efforts. Given the widespread use of Linux in cloud and on-premises virtualized environments across Europe, the potential scope of affected systems is broad, especially where Hyper-V is the chosen hypervisor platform.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to the patched version that includes the rate limiting fix for the storvsc driver. Specifically, kernel versions incorporating the commit identified by hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 or later should be deployed. Organizations should audit their virtualized environments to identify Linux VMs running on Hyper-V and verify kernel versions. Additionally, monitoring hypervisor health and storage I/O error rates can help detect conditions that might trigger this vulnerability. Implementing proactive alerting on abnormal SCSI error rates or kernel log flooding can enable early detection. Where possible, configuring hypervisor settings to minimize persistent I/O errors or isolating problematic VMs can reduce risk. For cloud providers and managed service providers, ensuring that guest Linux kernels are up to date and that hypervisor firmware and drivers are stable is critical. Finally, organizations should incorporate this vulnerability into their incident response plans, emphasizing the importance of kernel log monitoring and CPU utilization metrics in virtualized Linux guests.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.741Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe980d

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/30/2025, 5:29:53 PM

Last updated: 8/17/2025, 12:01:03 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats