CVE-2025-22065: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: idpf: fix adapter NULL pointer dereference on reboot With SRIOV enabled, idpf ends up calling into idpf_remove() twice. First via idpf_shutdown() and then again when idpf_remove() calls into sriov_disable(), because the VF devices use the idpf driver, hence the same remove routine. When that happens, it is possible for the adapter to be NULL from the first call to idpf_remove(), leading to a NULL pointer dereference. echo 1 > /sys/class/net/<netif>/device/sriov_numvfs reboot BUG: kernel NULL pointer dereference, address: 0000000000000020 ... RIP: 0010:idpf_remove+0x22/0x1f0 [idpf] ... ? idpf_remove+0x22/0x1f0 [idpf] ? idpf_remove+0x1e4/0x1f0 [idpf] pci_device_remove+0x3f/0xb0 device_release_driver_internal+0x19f/0x200 pci_stop_bus_device+0x6d/0x90 pci_stop_and_remove_bus_device+0x12/0x20 pci_iov_remove_virtfn+0xbe/0x120 sriov_disable+0x34/0xe0 idpf_sriov_configure+0x58/0x140 [idpf] idpf_remove+0x1b9/0x1f0 [idpf] idpf_shutdown+0x12/0x30 [idpf] pci_device_shutdown+0x35/0x60 device_shutdown+0x156/0x200 ... Replace the direct idpf_remove() call in idpf_shutdown() with idpf_vc_core_deinit() and idpf_deinit_dflt_mbx(), which perform the bulk of the cleanup, such as stopping the init task, freeing IRQs, destroying the vports and freeing the mailbox. This avoids the calls to sriov_disable() in addition to a small netdev cleanup, and destroying workqueues, which don't seem to be required on shutdown.
AI Analysis
Technical Summary
CVE-2025-22065 is a vulnerability identified in the Linux kernel's idpf driver, which manages Intel Ethernet devices supporting Single Root I/O Virtualization (SR-IOV). The flaw arises during the reboot process when SR-IOV is enabled and the system attempts to remove the idpf network adapter. Specifically, the idpf driver calls its removal routine idpf_remove() twice: once via idpf_shutdown() and again when idpf_remove() calls sriov_disable(). Because the Virtual Function (VF) devices also use the idpf driver, this results in the same removal routine being invoked twice. The first call to idpf_remove() can set the adapter pointer to NULL, and the second call then dereferences this NULL pointer, causing a kernel NULL pointer dereference. This leads to a kernel crash (BUG) and system instability during reboot. The root cause is the improper cleanup sequence in the driver, which was fixed by replacing the direct call to idpf_remove() in idpf_shutdown() with calls to idpf_vc_core_deinit() and idpf_deinit_dflt_mbx(), which perform necessary cleanup without triggering sriov_disable() again. This prevents the double removal and the resulting NULL pointer dereference. The vulnerability affects Linux kernel versions containing the specified commit hash e850efed5e152e6bdd367d5b82019f21298c0653 and likely related versions using the idpf driver with SR-IOV enabled. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected idpf driver and SR-IOV enabled on Intel Ethernet adapters. The impact is a denial of service (DoS) condition caused by a kernel crash during reboot, which can lead to system downtime and potential disruption of critical services. This is particularly significant for data centers, cloud providers, and enterprises relying on virtualized network functions and SR-IOV for performance optimization. While the vulnerability does not directly allow for privilege escalation or remote code execution, the forced reboot failure and kernel panic can interrupt business operations and complicate system maintenance. In environments with high availability requirements, such as financial institutions, telecommunications, and critical infrastructure in Europe, this could degrade service reliability. Additionally, repeated crashes might increase the risk of data corruption or loss if systems are not properly shut down. Since the vulnerability requires SR-IOV to be enabled and affects specific hardware drivers, the scope is limited to organizations using these configurations, but those affected should prioritize patching to maintain operational stability.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify Linux systems using Intel Ethernet adapters managed by the idpf driver with SR-IOV enabled. This can be done by checking network interface configurations and driver versions. 2) Apply the official Linux kernel patches that address CVE-2025-22065 as soon as they become available, ensuring the updated driver replaces the vulnerable code path. 3) If immediate patching is not feasible, consider temporarily disabling SR-IOV on affected network interfaces to prevent the double removal scenario during reboot. This can be done by setting /sys/class/net/<netif>/device/sriov_numvfs to 0. 4) Implement controlled reboot procedures with monitoring to detect and respond to kernel panics caused by this issue. 5) Maintain up-to-date backups and ensure recovery plans are tested to mitigate potential data loss from unexpected crashes. 6) Monitor vendor advisories and Linux kernel mailing lists for any emerging exploit reports or additional fixes. 7) For virtualized environments, coordinate with hypervisor and hardware vendors to confirm compatibility and support for patched drivers. These targeted actions go beyond generic advice by focusing on the affected driver, SR-IOV configurations, and operational practices relevant to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-22065: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: idpf: fix adapter NULL pointer dereference on reboot With SRIOV enabled, idpf ends up calling into idpf_remove() twice. First via idpf_shutdown() and then again when idpf_remove() calls into sriov_disable(), because the VF devices use the idpf driver, hence the same remove routine. When that happens, it is possible for the adapter to be NULL from the first call to idpf_remove(), leading to a NULL pointer dereference. echo 1 > /sys/class/net/<netif>/device/sriov_numvfs reboot BUG: kernel NULL pointer dereference, address: 0000000000000020 ... RIP: 0010:idpf_remove+0x22/0x1f0 [idpf] ... ? idpf_remove+0x22/0x1f0 [idpf] ? idpf_remove+0x1e4/0x1f0 [idpf] pci_device_remove+0x3f/0xb0 device_release_driver_internal+0x19f/0x200 pci_stop_bus_device+0x6d/0x90 pci_stop_and_remove_bus_device+0x12/0x20 pci_iov_remove_virtfn+0xbe/0x120 sriov_disable+0x34/0xe0 idpf_sriov_configure+0x58/0x140 [idpf] idpf_remove+0x1b9/0x1f0 [idpf] idpf_shutdown+0x12/0x30 [idpf] pci_device_shutdown+0x35/0x60 device_shutdown+0x156/0x200 ... Replace the direct idpf_remove() call in idpf_shutdown() with idpf_vc_core_deinit() and idpf_deinit_dflt_mbx(), which perform the bulk of the cleanup, such as stopping the init task, freeing IRQs, destroying the vports and freeing the mailbox. This avoids the calls to sriov_disable() in addition to a small netdev cleanup, and destroying workqueues, which don't seem to be required on shutdown.
AI-Powered Analysis
Technical Analysis
CVE-2025-22065 is a vulnerability identified in the Linux kernel's idpf driver, which manages Intel Ethernet devices supporting Single Root I/O Virtualization (SR-IOV). The flaw arises during the reboot process when SR-IOV is enabled and the system attempts to remove the idpf network adapter. Specifically, the idpf driver calls its removal routine idpf_remove() twice: once via idpf_shutdown() and again when idpf_remove() calls sriov_disable(). Because the Virtual Function (VF) devices also use the idpf driver, this results in the same removal routine being invoked twice. The first call to idpf_remove() can set the adapter pointer to NULL, and the second call then dereferences this NULL pointer, causing a kernel NULL pointer dereference. This leads to a kernel crash (BUG) and system instability during reboot. The root cause is the improper cleanup sequence in the driver, which was fixed by replacing the direct call to idpf_remove() in idpf_shutdown() with calls to idpf_vc_core_deinit() and idpf_deinit_dflt_mbx(), which perform necessary cleanup without triggering sriov_disable() again. This prevents the double removal and the resulting NULL pointer dereference. The vulnerability affects Linux kernel versions containing the specified commit hash e850efed5e152e6bdd367d5b82019f21298c0653 and likely related versions using the idpf driver with SR-IOV enabled. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected idpf driver and SR-IOV enabled on Intel Ethernet adapters. The impact is a denial of service (DoS) condition caused by a kernel crash during reboot, which can lead to system downtime and potential disruption of critical services. This is particularly significant for data centers, cloud providers, and enterprises relying on virtualized network functions and SR-IOV for performance optimization. While the vulnerability does not directly allow for privilege escalation or remote code execution, the forced reboot failure and kernel panic can interrupt business operations and complicate system maintenance. In environments with high availability requirements, such as financial institutions, telecommunications, and critical infrastructure in Europe, this could degrade service reliability. Additionally, repeated crashes might increase the risk of data corruption or loss if systems are not properly shut down. Since the vulnerability requires SR-IOV to be enabled and affects specific hardware drivers, the scope is limited to organizations using these configurations, but those affected should prioritize patching to maintain operational stability.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify Linux systems using Intel Ethernet adapters managed by the idpf driver with SR-IOV enabled. This can be done by checking network interface configurations and driver versions. 2) Apply the official Linux kernel patches that address CVE-2025-22065 as soon as they become available, ensuring the updated driver replaces the vulnerable code path. 3) If immediate patching is not feasible, consider temporarily disabling SR-IOV on affected network interfaces to prevent the double removal scenario during reboot. This can be done by setting /sys/class/net/<netif>/device/sriov_numvfs to 0. 4) Implement controlled reboot procedures with monitoring to detect and respond to kernel panics caused by this issue. 5) Maintain up-to-date backups and ensure recovery plans are tested to mitigate potential data loss from unexpected crashes. 6) Monitor vendor advisories and Linux kernel mailing lists for any emerging exploit reports or additional fixes. 7) For virtualized environments, coordinate with hypervisor and hardware vendors to confirm compatibility and support for patched drivers. These targeted actions go beyond generic advice by focusing on the affected driver, SR-IOV configurations, and operational practices relevant to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.813Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9831c4522896dcbe7fb0
Added to database: 5/21/2025, 9:09:05 AM
Last enriched: 7/3/2025, 8:43:00 PM
Last updated: 7/27/2025, 5:03:10 AM
Views: 10
Related Threats
CVE-2025-5456: CWE-125 Out-of-bounds Read in Ivanti Connect Secure
HighCVE-2025-3831: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor. in checkpoint Check Point Harmony SASE
HighCVE-2025-5462: CWE-122 Heap-based Buffer Overflow in Ivanti Connect Secure
HighCVE-2025-8310: CWE-862 Missing Authorization in Ivanti Virtual Application Delivery ControllerCWE-862
MediumCVE-2025-8297: CWE-434 Unrestricted Upload of File with Dangerous Type in Ivanti Avalanche
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.