Skip to main content

CVE-2025-22092: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-22092cvecve-2025-22092
Published: Wed Apr 16 2025 (04/16/2025, 14:12:43 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: PCI: Fix NULL dereference in SR-IOV VF creation error path Clean up when virtfn setup fails to prevent NULL pointer dereference during device removal. The kernel oops below occurred due to incorrect error handling flow when pci_setup_device() fails. Add pci_iov_scan_device(), which handles virtfn allocation and setup and cleans up if pci_setup_device() fails, so pci_iov_add_virtfn() doesn't need to call pci_stop_and_remove_bus_device(). This prevents accessing partially initialized virtfn devices during removal. BUG: kernel NULL pointer dereference, address: 00000000000000d0 RIP: 0010:device_del+0x3d/0x3d0 Call Trace: pci_remove_bus_device+0x7c/0x100 pci_iov_add_virtfn+0xfa/0x200 sriov_enable+0x208/0x420 mlx5_core_sriov_configure+0x6a/0x160 [mlx5_core] sriov_numvfs_store+0xae/0x1a0 [bhelgaas: commit log, return ERR_PTR(-ENOMEM) directly]

AI-Powered Analysis

AILast updated: 07/03/2025, 21:11:12 UTC

Technical Analysis

CVE-2025-22092 is a vulnerability identified in the Linux kernel related to the handling of PCI SR-IOV (Single Root I/O Virtualization) Virtual Function (VF) creation error paths. Specifically, the issue arises from improper error handling during the setup of virtual functions on PCI devices. When the pci_setup_device() function fails during the initialization of a virtual function, the kernel previously did not properly clean up partially initialized devices. This led to a NULL pointer dereference during device removal, causing a kernel oops (crash). The vulnerability manifests as a NULL pointer dereference at a low memory address (0x00000000000000d0), triggered in the device_del() function called during pci_remove_bus_device(). The root cause is the incorrect error handling flow that fails to prevent access to partially initialized virtual functions (virtfn) devices. The Linux kernel patch introduces a new function, pci_iov_scan_device(), which manages virtfn allocation and setup, and ensures cleanup if pci_setup_device() fails. This prevents the need for pci_iov_add_virtfn() to call pci_stop_and_remove_bus_device(), thereby avoiding access to uninitialized devices during removal. The vulnerability is relevant to Linux kernel versions identified by the commit hash e3f30d563a388220a7c4e3b9a7b52ac0b0324b26. No known exploits are currently reported in the wild. The issue is primarily a stability and availability concern, as the kernel crash can lead to denial of service on affected systems utilizing SR-IOV capable PCI devices, such as network interface cards (NICs) supporting virtualization features. The vulnerability does not appear to directly expose confidentiality or integrity risks but can disrupt system operations and potentially affect virtualized environments relying on SR-IOV for performance and isolation.

Potential Impact

For European organizations, the impact of CVE-2025-22092 can be significant in environments that utilize Linux servers with SR-IOV enabled PCI devices, commonly found in data centers, cloud service providers, and enterprises running virtualized workloads. The kernel NULL pointer dereference leads to system crashes, causing denial of service conditions that can interrupt business-critical applications and services. This is particularly impactful for sectors relying on high availability and virtualization technologies, such as telecommunications, finance, and cloud infrastructure providers. Disruptions in these sectors can lead to operational downtime, loss of productivity, and potential financial losses. While the vulnerability does not directly compromise data confidentiality or integrity, the resulting instability could be exploited in targeted denial of service attacks or combined with other vulnerabilities to escalate impact. European organizations with extensive Linux deployments, especially those using advanced networking hardware supporting SR-IOV, are at higher risk. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk of future exploitation once the vulnerability details become widely known.

Mitigation Recommendations

To mitigate CVE-2025-22092, European organizations should: 1) Apply the latest Linux kernel updates that include the patch addressing this vulnerability. The patch introduces pci_iov_scan_device() to properly handle error cleanup during virtfn setup failures. 2) Review and audit the use of SR-IOV features on PCI devices, particularly in virtualized environments, to ensure that only necessary virtual functions are enabled and that device drivers are up to date. 3) Implement robust monitoring of kernel logs and system stability to detect early signs of kernel oops or crashes related to PCI device initialization. 4) For critical systems, consider temporarily disabling SR-IOV functionality if kernel updates cannot be applied immediately, to prevent triggering the vulnerability. 5) Coordinate with hardware vendors to verify compatibility and firmware updates that may complement kernel patches for SR-IOV devices. 6) Incorporate this vulnerability into incident response and vulnerability management workflows to ensure timely patching and risk assessment. These steps go beyond generic advice by focusing on the specific SR-IOV context and kernel error handling improvements.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.817Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9832c4522896dcbe80b8

Added to database: 5/21/2025, 9:09:06 AM

Last enriched: 7/3/2025, 9:11:12 PM

Last updated: 8/14/2025, 9:50:58 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats