Skip to main content

CVE-2025-21925: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-21925cvecve-2025-21925
Published: Tue Apr 01 2025 (04/01/2025, 15:40:57 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: llc: do not use skb_get() before dev_queue_xmit() syzbot is able to crash hosts [1], using llc and devices not supporting IFF_TX_SKB_SHARING. In this case, e1000 driver calls eth_skb_pad(), while the skb is shared. Simply replace skb_get() by skb_clone() in net/llc/llc_s_ac.c Note that e1000 driver might have an issue with pktgen, because it does not clear IFF_TX_SKB_SHARING, this is an orthogonal change. We need to audit other skb_get() uses in net/llc. [1] kernel BUG at net/core/skbuff.c:2178 ! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 UID: 0 PID: 16371 Comm: syz.2.2764 Not tainted 6.14.0-rc4-syzkaller-00052-gac9c34d1e45a #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 RIP: 0010:pskb_expand_head+0x6ce/0x1240 net/core/skbuff.c:2178 Call Trace: <TASK> __skb_pad+0x18a/0x610 net/core/skbuff.c:2466 __skb_put_padto include/linux/skbuff.h:3843 [inline] skb_put_padto include/linux/skbuff.h:3862 [inline] eth_skb_pad include/linux/etherdevice.h:656 [inline] e1000_xmit_frame+0x2d99/0x5800 drivers/net/ethernet/intel/e1000/e1000_main.c:3128 __netdev_start_xmit include/linux/netdevice.h:5151 [inline] netdev_start_xmit include/linux/netdevice.h:5160 [inline] xmit_one net/core/dev.c:3806 [inline] dev_hard_start_xmit+0x9a/0x7b0 net/core/dev.c:3822 sch_direct_xmit+0x1ae/0xc30 net/sched/sch_generic.c:343 __dev_xmit_skb net/core/dev.c:4045 [inline] __dev_queue_xmit+0x13d4/0x43e0 net/core/dev.c:4621 dev_queue_xmit include/linux/netdevice.h:3313 [inline] llc_sap_action_send_test_c+0x268/0x320 net/llc/llc_s_ac.c:144 llc_exec_sap_trans_actions net/llc/llc_sap.c:153 [inline] llc_sap_next_state net/llc/llc_sap.c:182 [inline] llc_sap_state_process+0x239/0x510 net/llc/llc_sap.c:209 llc_ui_sendmsg+0xd0d/0x14e0 net/llc/af_llc.c:993 sock_sendmsg_nosec net/socket.c:718 [inline]

AI-Powered Analysis

AILast updated: 06/30/2025, 10:43:03 UTC

Technical Analysis

CVE-2025-21925 is a vulnerability identified in the Linux kernel, specifically related to the handling of socket buffers (sk_buff or skb) within the Logical Link Control (LLC) networking code and the e1000 Ethernet driver. The root cause involves improper use of the skb_get() function before calling dev_queue_xmit(), which is responsible for transmitting packets. The vulnerability arises because skb_get() increments the reference count of a shared skb, which can lead to a kernel crash when the e1000 driver calls eth_skb_pad() on a shared skb. This is problematic because eth_skb_pad() expects an unshared skb to safely pad the Ethernet frame, but the presence of shared skb buffers causes memory corruption or invalid operations, resulting in a kernel BUG and an invalid opcode exception. The issue was discovered by syzbot, an automated kernel fuzzing tool, which was able to crash hosts by exploiting this flaw using LLC and devices that do not support the IFF_TX_SKB_SHARING flag. The fix involves replacing skb_get() with skb_clone() in the net/llc/llc_s_ac.c source file, ensuring that a new skb copy is made rather than incrementing the reference count on a shared buffer. This prevents the kernel crash by avoiding modification of shared buffers. The vulnerability affects Linux kernel versions around 6.14.0-rc4 and potentially others using the e1000 driver and LLC networking code. There is also a note that the e1000 driver may have an unrelated issue with pktgen due to not clearing the IFF_TX_SKB_SHARING flag, but this is orthogonal to the vulnerability. No known exploits are reported in the wild yet, and no CVSS score has been assigned. The vulnerability can cause denial of service via kernel crashes, impacting system stability and availability.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions with the e1000 network driver enabled, which is common in many enterprise and cloud environments. The impact is mainly denial of service due to kernel crashes triggered by crafted network packets exploiting the skb reference counting flaw. This can disrupt critical services, especially in data centers, cloud providers, and network infrastructure relying on Linux servers. Systems used in telecommunications, financial services, and government sectors could face operational outages if exploited. Although no remote code execution or privilege escalation is indicated, the ability to crash the kernel remotely (via network packets) can be leveraged in targeted denial of service attacks. Given the widespread use of Linux in European IT infrastructure, including public sector and industrial control systems, the vulnerability could affect availability of essential services. The lack of known exploits reduces immediate risk, but the presence of an automated fuzzing tool discovery suggests potential for future exploitation. Organizations with high network traffic and exposure to untrusted networks are at greater risk.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched, specifically those that have replaced skb_get() with skb_clone() in the LLC networking code. Kernel updates should be applied promptly, especially on systems using the e1000 Ethernet driver. Network administrators should audit their environments for the presence of vulnerable kernel versions and drivers. As an interim mitigation, organizations can consider disabling LLC networking features if not required, or restricting network access to trusted sources to reduce exposure to crafted packets. Monitoring kernel logs for BUG or OOPS messages related to sk_buff or e1000 can help detect exploitation attempts. Additionally, organizations should review their use of pktgen and ensure network drivers are properly configured to avoid related issues. Implementing network segmentation and intrusion detection systems to detect anomalous LLC traffic patterns can further reduce risk. Finally, coordinating with Linux distribution vendors for timely security updates and advisories is recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.788Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe8bf7

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 10:43:03 AM

Last updated: 8/1/2025, 5:56:48 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats