CVE-2025-21981

In the Linux kernel, the following vulnerability has been resolved: ice: fix memory leak in aRFS after reset Fix aRFS (accelerated Receive Flow Steering) structures memory leak by adding a checker to verify if aRFS memory is already allocated while configuring VSI. aRFS objects are allocated in two cases: - as part of VSI initialization (at probe), and - as part of reset handling However, VSI reconfiguration executed during reset involves memory allocation one more time, without prior releasing already allocated resources. This led to the memory leak with the following signature: [root@os-delivery ~]# cat /sys/kernel/debug/kmemleak unreferenced object 0xff3c1ca7252e6000 (size 8192): comm "kworker/0:0", pid 8, jiffies 4296833052 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): [<ffffffff991ec485>] __kmalloc_cache_noprof+0x275/0x340 [<ffffffffc0a6e06a>] ice_init_arfs+0x3a/0xe0 [ice] [<ffffffffc09f1027>] ice_vsi_cfg_def+0x607/0x850 [ice] [<ffffffffc09f244b>] ice_vsi_setup+0x5b/0x130 [ice] [<ffffffffc09c2131>] ice_init+0x1c1/0x460 [ice] [<ffffffffc09c64af>] ice_probe+0x2af/0x520 [ice] [<ffffffff994fbcd3>] local_pci_probe+0x43/0xa0 [<ffffffff98f07103>] work_for_cpu_fn+0x13/0x20 [<ffffffff98f0b6d9>] process_one_work+0x179/0x390 [<ffffffff98f0c1e9>] worker_thread+0x239/0x340 [<ffffffff98f14abc>] kthread+0xcc/0x100 [<ffffffff98e45a6d>] ret_from_fork+0x2d/0x50 [<ffffffff98e083ba>] ret_from_fork_asm+0x1a/0x30 ...
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*

History

10 Apr 2025, 13:25

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/23d97f18901ef5e4e264e3b1777fe65c760186b5 - () https://git.kernel.org/stable/c/23d97f18901ef5e4e264e3b1777fe65c760186b5 - Patch
References () https://git.kernel.org/stable/c/3b27e6e10a32589fcd293b8933ab6de9387a460e - () https://git.kernel.org/stable/c/3b27e6e10a32589fcd293b8933ab6de9387a460e - Patch
References () https://git.kernel.org/stable/c/5d30d256661fc11b6e73fac6c3783a702e1006a3 - () https://git.kernel.org/stable/c/5d30d256661fc11b6e73fac6c3783a702e1006a3 - Patch
References () https://git.kernel.org/stable/c/78f3d64b30210c0e521c59357431aca14024cb79 - () https://git.kernel.org/stable/c/78f3d64b30210c0e521c59357431aca14024cb79 - Patch
References () https://git.kernel.org/stable/c/e6902101f34f098af59b0d1d8cf90c4124c02c6a - () https://git.kernel.org/stable/c/e6902101f34f098af59b0d1d8cf90c4124c02c6a - Patch
References () https://git.kernel.org/stable/c/ef2bc94059836a115430a6ad9d2838b0b34dc8f5 - () https://git.kernel.org/stable/c/ef2bc94059836a115430a6ad9d2838b0b34dc8f5 - Patch
References () https://git.kernel.org/stable/c/fcbacc47d16306c87ad1b820b7a575f6e9eae58b - () https://git.kernel.org/stable/c/fcbacc47d16306c87ad1b820b7a575f6e9eae58b - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-401
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

10 Apr 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/e6902101f34f098af59b0d1d8cf90c4124c02c6a -
  • () https://git.kernel.org/stable/c/ef2bc94059836a115430a6ad9d2838b0b34dc8f5 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: corrige pérdida de memoria en aRFS después del reinicio Corrige la pérdida de memoria de las estructuras aRFS (dirección de flujo de recepción acelerada) agregando un verificador para verificar si la memoria aRFS ya está asignada mientras se configura VSI. Los objetos aRFS se asignan en dos casos: - como parte de la inicialización de VSI (en la sonda), y - como parte de la gestión del reinicio. Sin embargo, la reconfiguración de VSI ejecutada durante el reinicio implica la asignación de memoria una vez más, sin liberar previamente los recursos ya asignados. Esto provocó la fuga de memoria con la siguiente firma: [root@os-delivery ~]# cat /sys/kernel/debug/kmemleak unreferenced object 0xff3c1ca7252e6000 (size 8192): comm "kworker/0:0", pid 8, jiffies 4296833052 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): [] __kmalloc_cache_noprof+0x275/0x340 [] ice_init_arfs+0x3a/0xe0 [ice] [] ice_vsi_cfg_def+0x607/0x850 [ice] [] ice_vsi_setup+0x5b/0x130 [ice] [] ice_init+0x1c1/0x460 [ice] [] ice_probe+0x2af/0x520 [ice] [] local_pci_probe+0x43/0xa0 [] work_for_cpu_fn+0x13/0x20 [] process_one_work+0x179/0x390 [] worker_thread+0x239/0x340 [] kthread+0xcc/0x100 [] ret_from_fork+0x2d/0x50 [] ret_from_fork_asm+0x1a/0x30 ...

01 Apr 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-01 16:15

Updated : 2025-04-10 13:25


NVD link : CVE-2025-21981

Mitre link : CVE-2025-21981

CVE.ORG link : CVE-2025-21981


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime