Skip to main content

CVE-2025-21701: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-21701cvecve-2025-21701
Published: Thu Feb 13 2025 (02/13/2025, 15:05:46 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: avoid race between device unregistration and ethnl ops The following trace can be seen if a device is being unregistered while its number of channels are being modified. DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 3 PID: 3754 at kernel/locking/mutex.c:564 __mutex_lock+0xc8a/0x1120 CPU: 3 UID: 0 PID: 3754 Comm: ethtool Not tainted 6.13.0-rc6+ #771 RIP: 0010:__mutex_lock+0xc8a/0x1120 Call Trace: <TASK> ethtool_check_max_channel+0x1ea/0x880 ethnl_set_channels+0x3c3/0xb10 ethnl_default_set_doit+0x306/0x650 genl_family_rcv_msg_doit+0x1e3/0x2c0 genl_rcv_msg+0x432/0x6f0 netlink_rcv_skb+0x13d/0x3b0 genl_rcv+0x28/0x40 netlink_unicast+0x42e/0x720 netlink_sendmsg+0x765/0xc20 __sys_sendto+0x3ac/0x420 __x64_sys_sendto+0xe0/0x1c0 do_syscall_64+0x95/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e This is because unregister_netdevice_many_notify might run before the rtnl lock section of ethnl operations, eg. set_channels in the above example. In this example the rss lock would be destroyed by the device unregistration path before being used again, but in general running ethnl operations while dismantle has started is not a good idea. Fix this by denying any operation on devices being unregistered. A check was already there in ethnl_ops_begin, but not wide enough. Note that the same issue cannot be seen on the ioctl version (__dev_ethtool) because the device reference is retrieved from within the rtnl lock section there. Once dismantle started, the net device is unlisted and no reference will be found.

AI-Powered Analysis

AILast updated: 06/27/2025, 23:40:13 UTC

Technical Analysis

CVE-2025-21701 is a race condition vulnerability in the Linux kernel's networking subsystem, specifically involving the interaction between device unregistration and ethtool netlink (ethnl) operations. The vulnerability arises when a network device is being unregistered concurrently while its number of channels is being modified through ethtool operations. The root cause is a timing issue where the unregister_netdevice_many_notify function can execute before the rtnl lock section of ethnl operations such as set_channels. This leads to a scenario where locks (e.g., rss lock) associated with the device may be destroyed during unregistration but still accessed by ongoing ethnl operations, causing kernel warnings and potential instability. The vulnerability manifests as a DEBUG_LOCKS_WARN_ON warning and kernel stack traces related to mutex locking failures. The flaw is due to insufficient checks preventing operations on devices that are in the process of being unregistered. The fix implemented involves expanding the existing ethnl_ops_begin check to deny any operation on devices undergoing unregistration, thereby preventing the race condition. Notably, this issue does not affect ioctl-based ethtool operations (__dev_ethtool) because they acquire device references within the rtnl lock, ensuring safe access. This vulnerability affects multiple Linux kernel versions prior to the fix and is relevant to any system running vulnerable kernel versions that utilize ethtool netlink operations for network device configuration. No known exploits are reported in the wild at this time, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected versions, especially those that rely on dynamic network device configuration via ethtool netlink operations. The impact includes potential kernel instability, warnings, or crashes due to race conditions in device unregistration and channel modification. This can lead to degraded network performance, service interruptions, or denial of service on critical infrastructure such as servers, network appliances, or cloud environments. Organizations with high network device churn or automated network configuration management are more susceptible. While the vulnerability does not directly enable privilege escalation or remote code execution, the resulting instability could be exploited in multi-tenant or critical environments to disrupt services. Given the widespread use of Linux in European data centers, telecommunications, and government infrastructure, the vulnerability could affect availability and operational continuity if unpatched. The absence of known exploits reduces immediate risk, but the technical nature of the flaw means skilled attackers or misconfigurations could trigger it.

Mitigation Recommendations

European organizations should prioritize updating Linux kernels to versions where this race condition is fixed. Specifically, applying the patch that expands ethnl_ops_begin checks to deny operations on devices being unregistered is critical. Network administrators should audit systems for kernel versions affected by this CVE and plan timely upgrades. Additionally, limiting concurrent network device modifications during unregistration processes can reduce exposure. Implementing strict change management and sequencing of network device operations can help avoid triggering the race. Monitoring kernel logs for DEBUG_LOCKS_WARN_ON or related mutex warnings can provide early detection of attempted exploitation or instability. For environments using automated network configuration tools, ensure these tools handle device unregistration and channel modifications sequentially or with appropriate locking. Finally, consider isolating critical network functions on dedicated hosts with minimal device churn to reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.748Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdd2f2

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 6/27/2025, 11:40:13 PM

Last updated: 8/6/2025, 2:16:23 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats