CVE-2025-21806 (GCVE-0-2025-21806)
Vulnerability from cvelistv5
Published
2025-02-27 20:00
Modified
2025-05-04 07:21
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: net: let net.core.dev_weight always be non-zero The following problem was encountered during stability test: (NULL net_device): NAPI poll function process_backlog+0x0/0x530 \ returned 1, exceeding its budget of 0. ------------[ cut here ]------------ list_add double add: new=ffff88905f746f48, prev=ffff88905f746f48, \ next=ffff88905f746e40. WARNING: CPU: 18 PID: 5462 at lib/list_debug.c:35 \ __list_add_valid_or_report+0xf3/0x130 CPU: 18 UID: 0 PID: 5462 Comm: ping Kdump: loaded Not tainted 6.13.0-rc7+ RIP: 0010:__list_add_valid_or_report+0xf3/0x130 Call Trace: ? __warn+0xcd/0x250 ? __list_add_valid_or_report+0xf3/0x130 enqueue_to_backlog+0x923/0x1070 netif_rx_internal+0x92/0x2b0 __netif_rx+0x15/0x170 loopback_xmit+0x2ef/0x450 dev_hard_start_xmit+0x103/0x490 __dev_queue_xmit+0xeac/0x1950 ip_finish_output2+0x6cc/0x1620 ip_output+0x161/0x270 ip_push_pending_frames+0x155/0x1a0 raw_sendmsg+0xe13/0x1550 __sys_sendto+0x3bf/0x4e0 __x64_sys_sendto+0xdc/0x1b0 do_syscall_64+0x5b/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e The reproduction command is as follows: sysctl -w net.core.dev_weight=0 ping 127.0.0.1 This is because when the napi's weight is set to 0, process_backlog() may return 0 and clear the NAPI_STATE_SCHED bit of napi->state, causing this napi to be re-polled in net_rx_action() until __do_softirq() times out. Since the NAPI_STATE_SCHED bit has been cleared, napi_schedule_rps() can be retriggered in enqueue_to_backlog(), causing this issue. Making the napi's weight always non-zero solves this problem. Triggering this issue requires system-wide admin (setting is not namespaced).
Impacted products
Vendor Product Version
Linux Linux Version: e3876605450979fe52a1a03e7eb78a89bf59e76a
Version: e3876605450979fe52a1a03e7eb78a89bf59e76a
Version: e3876605450979fe52a1a03e7eb78a89bf59e76a
Version: e3876605450979fe52a1a03e7eb78a89bf59e76a
Version: e3876605450979fe52a1a03e7eb78a89bf59e76a
Version: e3876605450979fe52a1a03e7eb78a89bf59e76a
Version: e3876605450979fe52a1a03e7eb78a89bf59e76a
Version: e3876605450979fe52a1a03e7eb78a89bf59e76a
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/core/sysctl_net_core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "d0e0f9c8218826926d7692980c98236d9f21fd3c",
              "status": "affected",
              "version": "e3876605450979fe52a1a03e7eb78a89bf59e76a",
              "versionType": "git"
            },
            {
              "lessThan": "c337c08819a4ec49edfdcd8fc46fbee120d8a5b2",
              "status": "affected",
              "version": "e3876605450979fe52a1a03e7eb78a89bf59e76a",
              "versionType": "git"
            },
            {
              "lessThan": "0e2f1d93d287d544d26f8ff293ea820a8079b9f8",
              "status": "affected",
              "version": "e3876605450979fe52a1a03e7eb78a89bf59e76a",
              "versionType": "git"
            },
            {
              "lessThan": "5860abbf15eeb61838b5e32e721ba67b0aa84450",
              "status": "affected",
              "version": "e3876605450979fe52a1a03e7eb78a89bf59e76a",
              "versionType": "git"
            },
            {
              "lessThan": "6ce38b5a6a49e65bad163162a54cb3f104c40b48",
              "status": "affected",
              "version": "e3876605450979fe52a1a03e7eb78a89bf59e76a",
              "versionType": "git"
            },
            {
              "lessThan": "33e2168788f8fb5cb8bd4f36cb1ef37d1d34dada",
              "status": "affected",
              "version": "e3876605450979fe52a1a03e7eb78a89bf59e76a",
              "versionType": "git"
            },
            {
              "lessThan": "1489824e5226a26841c70639ebd2d1aed390764b",
              "status": "affected",
              "version": "e3876605450979fe52a1a03e7eb78a89bf59e76a",
              "versionType": "git"
            },
            {
              "lessThan": "d1f9f79fa2af8e3b45cffdeef66e05833480148a",
              "status": "affected",
              "version": "e3876605450979fe52a1a03e7eb78a89bf59e76a",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/core/sysctl_net_core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.12"
            },
            {
              "lessThan": "2.6.12",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.291",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.235",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.179",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.129",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.76",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.13",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.13.*",
              "status": "unaffected",
              "version": "6.13.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.14",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.291",
                  "versionStartIncluding": "2.6.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.235",
                  "versionStartIncluding": "2.6.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.179",
                  "versionStartIncluding": "2.6.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.129",
                  "versionStartIncluding": "2.6.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.76",
                  "versionStartIncluding": "2.6.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.13",
                  "versionStartIncluding": "2.6.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.13.2",
                  "versionStartIncluding": "2.6.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.14",
                  "versionStartIncluding": "2.6.12",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: let net.core.dev_weight always be non-zero\n\nThe following problem was encountered during stability test:\n\n(NULL net_device): NAPI poll function process_backlog+0x0/0x530 \\\n\treturned 1, exceeding its budget of 0.\n------------[ cut here ]------------\nlist_add double add: new=ffff88905f746f48, prev=ffff88905f746f48, \\\n\tnext=ffff88905f746e40.\nWARNING: CPU: 18 PID: 5462 at lib/list_debug.c:35 \\\n\t__list_add_valid_or_report+0xf3/0x130\nCPU: 18 UID: 0 PID: 5462 Comm: ping Kdump: loaded Not tainted 6.13.0-rc7+\nRIP: 0010:__list_add_valid_or_report+0xf3/0x130\nCall Trace:\n? __warn+0xcd/0x250\n? __list_add_valid_or_report+0xf3/0x130\nenqueue_to_backlog+0x923/0x1070\nnetif_rx_internal+0x92/0x2b0\n__netif_rx+0x15/0x170\nloopback_xmit+0x2ef/0x450\ndev_hard_start_xmit+0x103/0x490\n__dev_queue_xmit+0xeac/0x1950\nip_finish_output2+0x6cc/0x1620\nip_output+0x161/0x270\nip_push_pending_frames+0x155/0x1a0\nraw_sendmsg+0xe13/0x1550\n__sys_sendto+0x3bf/0x4e0\n__x64_sys_sendto+0xdc/0x1b0\ndo_syscall_64+0x5b/0x170\nentry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe reproduction command is as follows:\n  sysctl -w net.core.dev_weight=0\n  ping 127.0.0.1\n\nThis is because when the napi\u0027s weight is set to 0, process_backlog() may\nreturn 0 and clear the NAPI_STATE_SCHED bit of napi-\u003estate, causing this\nnapi to be re-polled in net_rx_action() until __do_softirq() times out.\nSince the NAPI_STATE_SCHED bit has been cleared, napi_schedule_rps() can\nbe retriggered in enqueue_to_backlog(), causing this issue.\n\nMaking the napi\u0027s weight always non-zero solves this problem.\n\nTriggering this issue requires system-wide admin (setting is\nnot namespaced)."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T07:21:36.456Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/d0e0f9c8218826926d7692980c98236d9f21fd3c"
        },
        {
          "url": "https://git.kernel.org/stable/c/c337c08819a4ec49edfdcd8fc46fbee120d8a5b2"
        },
        {
          "url": "https://git.kernel.org/stable/c/0e2f1d93d287d544d26f8ff293ea820a8079b9f8"
        },
        {
          "url": "https://git.kernel.org/stable/c/5860abbf15eeb61838b5e32e721ba67b0aa84450"
        },
        {
          "url": "https://git.kernel.org/stable/c/6ce38b5a6a49e65bad163162a54cb3f104c40b48"
        },
        {
          "url": "https://git.kernel.org/stable/c/33e2168788f8fb5cb8bd4f36cb1ef37d1d34dada"
        },
        {
          "url": "https://git.kernel.org/stable/c/1489824e5226a26841c70639ebd2d1aed390764b"
        },
        {
          "url": "https://git.kernel.org/stable/c/d1f9f79fa2af8e3b45cffdeef66e05833480148a"
        }
      ],
      "title": "net: let net.core.dev_weight always be non-zero",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-21806",
    "datePublished": "2025-02-27T20:00:58.918Z",
    "dateReserved": "2024-12-29T08:45:45.771Z",
    "dateUpdated": "2025-05-04T07:21:36.456Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-21806\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-02-27T20:16:03.220\",\"lastModified\":\"2025-03-13T13:15:55.967\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: let net.core.dev_weight always be non-zero\\n\\nThe following problem was encountered during stability test:\\n\\n(NULL net_device): NAPI poll function process_backlog+0x0/0x530 \\\\\\n\\treturned 1, exceeding its budget of 0.\\n------------[ cut here ]------------\\nlist_add double add: new=ffff88905f746f48, prev=ffff88905f746f48, \\\\\\n\\tnext=ffff88905f746e40.\\nWARNING: CPU: 18 PID: 5462 at lib/list_debug.c:35 \\\\\\n\\t__list_add_valid_or_report+0xf3/0x130\\nCPU: 18 UID: 0 PID: 5462 Comm: ping Kdump: loaded Not tainted 6.13.0-rc7+\\nRIP: 0010:__list_add_valid_or_report+0xf3/0x130\\nCall Trace:\\n? __warn+0xcd/0x250\\n? __list_add_valid_or_report+0xf3/0x130\\nenqueue_to_backlog+0x923/0x1070\\nnetif_rx_internal+0x92/0x2b0\\n__netif_rx+0x15/0x170\\nloopback_xmit+0x2ef/0x450\\ndev_hard_start_xmit+0x103/0x490\\n__dev_queue_xmit+0xeac/0x1950\\nip_finish_output2+0x6cc/0x1620\\nip_output+0x161/0x270\\nip_push_pending_frames+0x155/0x1a0\\nraw_sendmsg+0xe13/0x1550\\n__sys_sendto+0x3bf/0x4e0\\n__x64_sys_sendto+0xdc/0x1b0\\ndo_syscall_64+0x5b/0x170\\nentry_SYSCALL_64_after_hwframe+0x76/0x7e\\n\\nThe reproduction command is as follows:\\n  sysctl -w net.core.dev_weight=0\\n  ping 127.0.0.1\\n\\nThis is because when the napi\u0027s weight is set to 0, process_backlog() may\\nreturn 0 and clear the NAPI_STATE_SCHED bit of napi-\u003estate, causing this\\nnapi to be re-polled in net_rx_action() until __do_softirq() times out.\\nSince the NAPI_STATE_SCHED bit has been cleared, napi_schedule_rps() can\\nbe retriggered in enqueue_to_backlog(), causing this issue.\\n\\nMaking the napi\u0027s weight always non-zero solves this problem.\\n\\nTriggering this issue requires system-wide admin (setting is\\nnot namespaced).\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: deje que net.core.dev_weight siempre sea distinto de cero. Se encontr\u00f3 el siguiente problema durante la prueba de estabilidad: (NULL net_device): la funci\u00f3n de sondeo NAPI process_backlog+0x0/0x530 \\\\ devolvi\u00f3 1, excediendo su presupuesto de 0. ------------[ cortar aqu\u00ed ]------------ list_add double add: new=ffff88905f746f48, prev=ffff88905f746f48, \\\\ next=ffff88905f746e40. WARNING: CPU: 18 PID: 5462 at lib/list_debug.c:35 \\\\ __list_add_valid_or_report+0xf3/0x130 CPU: 18 UID: 0 PID: 5462 Comm: ping Kdump: loaded Not tainted 6.13.0-rc7+ RIP: 0010:__list_add_valid_or_report+0xf3/0x130 Call Trace: ? __warn+0xcd/0x250 ? __list_add_valid_or_report+0xf3/0x130 enqueue_to_backlog+0x923/0x1070 netif_rx_internal+0x92/0x2b0 __netif_rx+0x15/0x170 loopback_xmit+0x2ef/0x450 dev_hard_start_xmit+0x103/0x490 __dev_queue_xmit+0xeac/0x1950 ip_finish_output2+0x6cc/0x1620 ip_output+0x161/0x270 ip_push_pending_frames+0x155/0x1a0 raw_sendmsg+0xe13/0x1550 __sys_sendto+0x3bf/0x4e0 __x64_sys_sendto+0xdc/0x1b0 do_syscall_64+0x5b/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e The reproduction command is as follows: sysctl -w net.core.dev_weight=0 ping 127.0.0.1 This is because when the napi\u0027s weight is set to 0, process_backlog() may return 0 and clear the NAPI_STATE_SCHED bit of napi-\u0026gt;state, causing this napi to be re-polled in net_rx_action() until __do_softirq() times out. Dado que el bit NAPI_STATE_SCHED se ha borrado, napi_schedule_rps() se puede volver a activar en enqueue_to_backlog(), lo que causa este problema. Hacer que el peso de napi siempre sea distinto de cero resuelve este problema. Para desencadenar este problema se requiere un administrador de todo el sistema (la configuraci\u00f3n no tiene espacio de nombres).\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0e2f1d93d287d544d26f8ff293ea820a8079b9f8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/1489824e5226a26841c70639ebd2d1aed390764b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/33e2168788f8fb5cb8bd4f36cb1ef37d1d34dada\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5860abbf15eeb61838b5e32e721ba67b0aa84450\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6ce38b5a6a49e65bad163162a54cb3f104c40b48\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c337c08819a4ec49edfdcd8fc46fbee120d8a5b2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d0e0f9c8218826926d7692980c98236d9f21fd3c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d1f9f79fa2af8e3b45cffdeef66e05833480148a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…