CVE-2025-21883: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ice: Fix deinitializing VF in error path If ice_ena_vfs() fails after calling ice_create_vf_entries(), it frees all VFs without removing them from snapshot PF-VF mailbox list, leading to list corruption. Reproducer: devlink dev eswitch set $PF1_PCI mode switchdev ip l s $PF1 up ip l s $PF1 promisc on sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs Trace (minimized): list_add corruption. next->prev should be prev (ffff8882e241c6f0), but was 0000000000000000. (next=ffff888455da1330). kernel BUG at lib/list_debug.c:29! RIP: 0010:__list_add_valid_or_report+0xa6/0x100 ice_mbx_init_vf_info+0xa7/0x180 [ice] ice_initialize_vf_entry+0x1fa/0x250 [ice] ice_sriov_configure+0x8d7/0x1520 [ice] ? __percpu_ref_switch_mode+0x1b1/0x5d0 ? __pfx_ice_sriov_configure+0x10/0x10 [ice] Sometimes a KASAN report can be seen instead with a similar stack trace: BUG: KASAN: use-after-free in __list_add_valid_or_report+0xf1/0x100 VFs are added to this list in ice_mbx_init_vf_info(), but only removed in ice_free_vfs(). Move the removing to ice_free_vf_entries(), which is also being called in other places where VFs are being removed (including ice_free_vfs() itself).
AI Analysis
Technical Summary
CVE-2025-21883 is a vulnerability identified in the Linux kernel's 'ice' driver, which manages Intel Ethernet controllers supporting SR-IOV (Single Root I/O Virtualization). The flaw arises during the deinitialization of Virtual Functions (VFs) in an error path when the function ice_ena_vfs() fails after invoking ice_create_vf_entries(). Specifically, the vulnerability is due to improper handling of the PF-VF mailbox list: when VFs are freed, they are not removed from this linked list, causing list corruption. This corruption manifests as a broken doubly linked list where the 'next->prev' pointer is null instead of pointing to the previous element, leading to kernel bugs and potential crashes. The issue can be reproduced by configuring the physical function (PF) network interface into switchdev mode, enabling promiscuous mode, and repeatedly setting the number of VFs via the sriov_numvfs sysfs interface. The kernel trace shows failures in list management functions (__list_add_valid_or_report), and sometimes KASAN (Kernel Address Sanitizer) reports use-after-free errors in the same code path. The root cause is that VFs are added to the mailbox list in ice_mbx_init_vf_info() but only removed in ice_free_vfs(), which is not always called in all error scenarios. The fix involves moving the removal logic to ice_free_vf_entries(), which is consistently called when VFs are freed, preventing list corruption. This vulnerability affects Linux kernel versions containing the affected ice driver code, particularly impacting systems using Intel Ethernet hardware with SR-IOV capabilities. While no known exploits are reported in the wild, the vulnerability can cause kernel crashes and memory corruption, potentially leading to denial of service or escalation of privileges if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to data centers, cloud providers, and enterprises relying on Linux servers with Intel Ethernet adapters that support SR-IOV. The vulnerability can cause kernel panics or crashes, leading to denial of service conditions on critical infrastructure. In environments using virtualization and network function virtualization (NFV), where SR-IOV is leveraged for performance, this flaw could disrupt network connectivity or isolate virtual machines unexpectedly. Although no direct remote code execution or privilege escalation has been documented, the instability caused by list corruption could be leveraged by attackers with local access to cause system outages or potentially escalate privileges by exploiting kernel memory corruption. This is particularly concerning for European organizations in sectors such as finance, telecommunications, and critical infrastructure, where uptime and network reliability are paramount. Additionally, the vulnerability could affect cloud service providers operating in Europe, impacting multi-tenant environments and potentially causing cascading failures. Given the widespread use of Linux in European IT infrastructure and the adoption of Intel network hardware, the potential impact is broad but focused on systems with SR-IOV enabled network interfaces.
Mitigation Recommendations
European organizations should prioritize patching Linux kernels with the updated ice driver that addresses this vulnerability. Since the issue occurs during VF deinitialization, disabling SR-IOV on affected network interfaces can serve as a temporary mitigation if patching is not immediately feasible. Network administrators should audit their systems to identify servers using Intel Ethernet adapters with SR-IOV enabled and verify kernel versions against the patched releases. Implementing strict access controls to limit local user privileges can reduce the risk of exploitation, as local access is required to trigger the vulnerability. Monitoring kernel logs for signs of list corruption or KASAN reports can help detect attempted exploitation or system instability. For virtualization environments, consider isolating critical workloads from hosts with vulnerable drivers until patches are applied. Additionally, coordinate with hardware vendors and Linux distribution maintainers to ensure timely deployment of security updates. Finally, review and test network interface configurations to avoid repeated VF reconfiguration commands that could inadvertently trigger the bug.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-21883: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ice: Fix deinitializing VF in error path If ice_ena_vfs() fails after calling ice_create_vf_entries(), it frees all VFs without removing them from snapshot PF-VF mailbox list, leading to list corruption. Reproducer: devlink dev eswitch set $PF1_PCI mode switchdev ip l s $PF1 up ip l s $PF1 promisc on sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs Trace (minimized): list_add corruption. next->prev should be prev (ffff8882e241c6f0), but was 0000000000000000. (next=ffff888455da1330). kernel BUG at lib/list_debug.c:29! RIP: 0010:__list_add_valid_or_report+0xa6/0x100 ice_mbx_init_vf_info+0xa7/0x180 [ice] ice_initialize_vf_entry+0x1fa/0x250 [ice] ice_sriov_configure+0x8d7/0x1520 [ice] ? __percpu_ref_switch_mode+0x1b1/0x5d0 ? __pfx_ice_sriov_configure+0x10/0x10 [ice] Sometimes a KASAN report can be seen instead with a similar stack trace: BUG: KASAN: use-after-free in __list_add_valid_or_report+0xf1/0x100 VFs are added to this list in ice_mbx_init_vf_info(), but only removed in ice_free_vfs(). Move the removing to ice_free_vf_entries(), which is also being called in other places where VFs are being removed (including ice_free_vfs() itself).
AI-Powered Analysis
Technical Analysis
CVE-2025-21883 is a vulnerability identified in the Linux kernel's 'ice' driver, which manages Intel Ethernet controllers supporting SR-IOV (Single Root I/O Virtualization). The flaw arises during the deinitialization of Virtual Functions (VFs) in an error path when the function ice_ena_vfs() fails after invoking ice_create_vf_entries(). Specifically, the vulnerability is due to improper handling of the PF-VF mailbox list: when VFs are freed, they are not removed from this linked list, causing list corruption. This corruption manifests as a broken doubly linked list where the 'next->prev' pointer is null instead of pointing to the previous element, leading to kernel bugs and potential crashes. The issue can be reproduced by configuring the physical function (PF) network interface into switchdev mode, enabling promiscuous mode, and repeatedly setting the number of VFs via the sriov_numvfs sysfs interface. The kernel trace shows failures in list management functions (__list_add_valid_or_report), and sometimes KASAN (Kernel Address Sanitizer) reports use-after-free errors in the same code path. The root cause is that VFs are added to the mailbox list in ice_mbx_init_vf_info() but only removed in ice_free_vfs(), which is not always called in all error scenarios. The fix involves moving the removal logic to ice_free_vf_entries(), which is consistently called when VFs are freed, preventing list corruption. This vulnerability affects Linux kernel versions containing the affected ice driver code, particularly impacting systems using Intel Ethernet hardware with SR-IOV capabilities. While no known exploits are reported in the wild, the vulnerability can cause kernel crashes and memory corruption, potentially leading to denial of service or escalation of privileges if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to data centers, cloud providers, and enterprises relying on Linux servers with Intel Ethernet adapters that support SR-IOV. The vulnerability can cause kernel panics or crashes, leading to denial of service conditions on critical infrastructure. In environments using virtualization and network function virtualization (NFV), where SR-IOV is leveraged for performance, this flaw could disrupt network connectivity or isolate virtual machines unexpectedly. Although no direct remote code execution or privilege escalation has been documented, the instability caused by list corruption could be leveraged by attackers with local access to cause system outages or potentially escalate privileges by exploiting kernel memory corruption. This is particularly concerning for European organizations in sectors such as finance, telecommunications, and critical infrastructure, where uptime and network reliability are paramount. Additionally, the vulnerability could affect cloud service providers operating in Europe, impacting multi-tenant environments and potentially causing cascading failures. Given the widespread use of Linux in European IT infrastructure and the adoption of Intel network hardware, the potential impact is broad but focused on systems with SR-IOV enabled network interfaces.
Mitigation Recommendations
European organizations should prioritize patching Linux kernels with the updated ice driver that addresses this vulnerability. Since the issue occurs during VF deinitialization, disabling SR-IOV on affected network interfaces can serve as a temporary mitigation if patching is not immediately feasible. Network administrators should audit their systems to identify servers using Intel Ethernet adapters with SR-IOV enabled and verify kernel versions against the patched releases. Implementing strict access controls to limit local user privileges can reduce the risk of exploitation, as local access is required to trigger the vulnerability. Monitoring kernel logs for signs of list corruption or KASAN reports can help detect attempted exploitation or system instability. For virtualization environments, consider isolating critical workloads from hosts with vulnerable drivers until patches are applied. Additionally, coordinate with hardware vendors and Linux distribution maintainers to ensure timely deployment of security updates. Finally, review and test network interface configurations to avoid repeated VF reconfiguration commands that could inadvertently trigger the bug.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.782Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9832c4522896dcbe8af3
Added to database: 5/21/2025, 9:09:06 AM
Last enriched: 6/30/2025, 10:13:57 AM
Last updated: 8/17/2025, 1:19:54 AM
Views: 15
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.