CVE-2025-21883: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ice: Fix deinitializing VF in error path If ice_ena_vfs() fails after calling ice_create_vf_entries(), it frees all VFs without removing them from snapshot PF-VF mailbox list, leading to list corruption. Reproducer: devlink dev eswitch set $PF1_PCI mode switchdev ip l s $PF1 up ip l s $PF1 promisc on sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs Trace (minimized): list_add corruption. next->prev should be prev (ffff8882e241c6f0), but was 0000000000000000. (next=ffff888455da1330). kernel BUG at lib/list_debug.c:29! RIP: 0010:__list_add_valid_or_report+0xa6/0x100 ice_mbx_init_vf_info+0xa7/0x180 [ice] ice_initialize_vf_entry+0x1fa/0x250 [ice] ice_sriov_configure+0x8d7/0x1520 [ice] ? __percpu_ref_switch_mode+0x1b1/0x5d0 ? __pfx_ice_sriov_configure+0x10/0x10 [ice] Sometimes a KASAN report can be seen instead with a similar stack trace: BUG: KASAN: use-after-free in __list_add_valid_or_report+0xf1/0x100 VFs are added to this list in ice_mbx_init_vf_info(), but only removed in ice_free_vfs(). Move the removing to ice_free_vf_entries(), which is also being called in other places where VFs are being removed (including ice_free_vfs() itself).
AI Analysis
Technical Summary
CVE-2025-21883 is a vulnerability identified in the Linux kernel's 'ice' driver, which manages Intel Ethernet controllers supporting SR-IOV (Single Root I/O Virtualization). The flaw arises during the deinitialization of Virtual Functions (VFs) in an error path when the function ice_ena_vfs() fails after invoking ice_create_vf_entries(). Specifically, the vulnerability is due to improper handling of the PF-VF mailbox list: when VFs are freed, they are not removed from this linked list, causing list corruption. This corruption manifests as a broken doubly linked list where the 'next->prev' pointer is null instead of pointing to the previous element, leading to kernel bugs and potential crashes. The issue can be reproduced by configuring the physical function (PF) network interface into switchdev mode, enabling promiscuous mode, and repeatedly setting the number of VFs via the sriov_numvfs sysfs interface. The kernel trace shows failures in list management functions (__list_add_valid_or_report), and sometimes KASAN (Kernel Address Sanitizer) reports use-after-free errors in the same code path. The root cause is that VFs are added to the mailbox list in ice_mbx_init_vf_info() but only removed in ice_free_vfs(), which is not always called in all error scenarios. The fix involves moving the removal logic to ice_free_vf_entries(), which is consistently called when VFs are freed, preventing list corruption. This vulnerability affects Linux kernel versions containing the affected ice driver code, particularly impacting systems using Intel Ethernet hardware with SR-IOV capabilities. While no known exploits are reported in the wild, the vulnerability can cause kernel crashes and memory corruption, potentially leading to denial of service or escalation of privileges if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to data centers, cloud providers, and enterprises relying on Linux servers with Intel Ethernet adapters that support SR-IOV. The vulnerability can cause kernel panics or crashes, leading to denial of service conditions on critical infrastructure. In environments using virtualization and network function virtualization (NFV), where SR-IOV is leveraged for performance, this flaw could disrupt network connectivity or isolate virtual machines unexpectedly. Although no direct remote code execution or privilege escalation has been documented, the instability caused by list corruption could be leveraged by attackers with local access to cause system outages or potentially escalate privileges by exploiting kernel memory corruption. This is particularly concerning for European organizations in sectors such as finance, telecommunications, and critical infrastructure, where uptime and network reliability are paramount. Additionally, the vulnerability could affect cloud service providers operating in Europe, impacting multi-tenant environments and potentially causing cascading failures. Given the widespread use of Linux in European IT infrastructure and the adoption of Intel network hardware, the potential impact is broad but focused on systems with SR-IOV enabled network interfaces.
Mitigation Recommendations
European organizations should prioritize patching Linux kernels with the updated ice driver that addresses this vulnerability. Since the issue occurs during VF deinitialization, disabling SR-IOV on affected network interfaces can serve as a temporary mitigation if patching is not immediately feasible. Network administrators should audit their systems to identify servers using Intel Ethernet adapters with SR-IOV enabled and verify kernel versions against the patched releases. Implementing strict access controls to limit local user privileges can reduce the risk of exploitation, as local access is required to trigger the vulnerability. Monitoring kernel logs for signs of list corruption or KASAN reports can help detect attempted exploitation or system instability. For virtualization environments, consider isolating critical workloads from hosts with vulnerable drivers until patches are applied. Additionally, coordinate with hardware vendors and Linux distribution maintainers to ensure timely deployment of security updates. Finally, review and test network interface configurations to avoid repeated VF reconfiguration commands that could inadvertently trigger the bug.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-21883: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ice: Fix deinitializing VF in error path If ice_ena_vfs() fails after calling ice_create_vf_entries(), it frees all VFs without removing them from snapshot PF-VF mailbox list, leading to list corruption. Reproducer: devlink dev eswitch set $PF1_PCI mode switchdev ip l s $PF1 up ip l s $PF1 promisc on sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs Trace (minimized): list_add corruption. next->prev should be prev (ffff8882e241c6f0), but was 0000000000000000. (next=ffff888455da1330). kernel BUG at lib/list_debug.c:29! RIP: 0010:__list_add_valid_or_report+0xa6/0x100 ice_mbx_init_vf_info+0xa7/0x180 [ice] ice_initialize_vf_entry+0x1fa/0x250 [ice] ice_sriov_configure+0x8d7/0x1520 [ice] ? __percpu_ref_switch_mode+0x1b1/0x5d0 ? __pfx_ice_sriov_configure+0x10/0x10 [ice] Sometimes a KASAN report can be seen instead with a similar stack trace: BUG: KASAN: use-after-free in __list_add_valid_or_report+0xf1/0x100 VFs are added to this list in ice_mbx_init_vf_info(), but only removed in ice_free_vfs(). Move the removing to ice_free_vf_entries(), which is also being called in other places where VFs are being removed (including ice_free_vfs() itself).
AI-Powered Analysis
Technical Analysis
CVE-2025-21883 is a vulnerability identified in the Linux kernel's 'ice' driver, which manages Intel Ethernet controllers supporting SR-IOV (Single Root I/O Virtualization). The flaw arises during the deinitialization of Virtual Functions (VFs) in an error path when the function ice_ena_vfs() fails after invoking ice_create_vf_entries(). Specifically, the vulnerability is due to improper handling of the PF-VF mailbox list: when VFs are freed, they are not removed from this linked list, causing list corruption. This corruption manifests as a broken doubly linked list where the 'next->prev' pointer is null instead of pointing to the previous element, leading to kernel bugs and potential crashes. The issue can be reproduced by configuring the physical function (PF) network interface into switchdev mode, enabling promiscuous mode, and repeatedly setting the number of VFs via the sriov_numvfs sysfs interface. The kernel trace shows failures in list management functions (__list_add_valid_or_report), and sometimes KASAN (Kernel Address Sanitizer) reports use-after-free errors in the same code path. The root cause is that VFs are added to the mailbox list in ice_mbx_init_vf_info() but only removed in ice_free_vfs(), which is not always called in all error scenarios. The fix involves moving the removal logic to ice_free_vf_entries(), which is consistently called when VFs are freed, preventing list corruption. This vulnerability affects Linux kernel versions containing the affected ice driver code, particularly impacting systems using Intel Ethernet hardware with SR-IOV capabilities. While no known exploits are reported in the wild, the vulnerability can cause kernel crashes and memory corruption, potentially leading to denial of service or escalation of privileges if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to data centers, cloud providers, and enterprises relying on Linux servers with Intel Ethernet adapters that support SR-IOV. The vulnerability can cause kernel panics or crashes, leading to denial of service conditions on critical infrastructure. In environments using virtualization and network function virtualization (NFV), where SR-IOV is leveraged for performance, this flaw could disrupt network connectivity or isolate virtual machines unexpectedly. Although no direct remote code execution or privilege escalation has been documented, the instability caused by list corruption could be leveraged by attackers with local access to cause system outages or potentially escalate privileges by exploiting kernel memory corruption. This is particularly concerning for European organizations in sectors such as finance, telecommunications, and critical infrastructure, where uptime and network reliability are paramount. Additionally, the vulnerability could affect cloud service providers operating in Europe, impacting multi-tenant environments and potentially causing cascading failures. Given the widespread use of Linux in European IT infrastructure and the adoption of Intel network hardware, the potential impact is broad but focused on systems with SR-IOV enabled network interfaces.
Mitigation Recommendations
European organizations should prioritize patching Linux kernels with the updated ice driver that addresses this vulnerability. Since the issue occurs during VF deinitialization, disabling SR-IOV on affected network interfaces can serve as a temporary mitigation if patching is not immediately feasible. Network administrators should audit their systems to identify servers using Intel Ethernet adapters with SR-IOV enabled and verify kernel versions against the patched releases. Implementing strict access controls to limit local user privileges can reduce the risk of exploitation, as local access is required to trigger the vulnerability. Monitoring kernel logs for signs of list corruption or KASAN reports can help detect attempted exploitation or system instability. For virtualization environments, consider isolating critical workloads from hosts with vulnerable drivers until patches are applied. Additionally, coordinate with hardware vendors and Linux distribution maintainers to ensure timely deployment of security updates. Finally, review and test network interface configurations to avoid repeated VF reconfiguration commands that could inadvertently trigger the bug.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.782Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9832c4522896dcbe8af3
Added to database: 5/21/2025, 9:09:06 AM
Last enriched: 6/30/2025, 10:13:57 AM
Last updated: 1/7/2026, 6:07:41 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.