CVE-2025-21717
Vulnerability from cvelistv5
Published
2025-02-27 02:07
Modified
2025-02-27 02:07
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: add missing cpu_to_node to kvzalloc_node in mlx5e_open_xdpredirect_sq kvzalloc_node is not doing a runtime check on the node argument (__alloc_pages_node_noprof does have a VM_BUG_ON, but it expands to nothing on !CONFIG_DEBUG_VM builds), so doing any ethtool/netlink operation that calls mlx5e_open on a CPU that's larger that MAX_NUMNODES triggers OOB access and panic (see the trace below). Add missing cpu_to_node call to convert cpu id to node id. [ 165.427394] mlx5_core 0000:5c:00.0 beth1: Link up [ 166.479327] BUG: unable to handle page fault for address: 0000000800000010 [ 166.494592] #PF: supervisor read access in kernel mode [ 166.505995] #PF: error_code(0x0000) - not-present page ... [ 166.816958] Call Trace: [ 166.822380] <TASK> [ 166.827034] ? __die_body+0x64/0xb0 [ 166.834774] ? page_fault_oops+0x2cd/0x3f0 [ 166.843862] ? exc_page_fault+0x63/0x130 [ 166.852564] ? asm_exc_page_fault+0x22/0x30 [ 166.861843] ? __kvmalloc_node_noprof+0x43/0xd0 [ 166.871897] ? get_partial_node+0x1c/0x320 [ 166.880983] ? deactivate_slab+0x269/0x2b0 [ 166.890069] ___slab_alloc+0x521/0xa90 [ 166.898389] ? __kvmalloc_node_noprof+0x43/0xd0 [ 166.908442] __kmalloc_node_noprof+0x216/0x3f0 [ 166.918302] ? __kvmalloc_node_noprof+0x43/0xd0 [ 166.928354] __kvmalloc_node_noprof+0x43/0xd0 [ 166.938021] mlx5e_open_channels+0x5e2/0xc00 [ 166.947496] mlx5e_open_locked+0x3e/0xf0 [ 166.956201] mlx5e_open+0x23/0x50 [ 166.963551] __dev_open+0x114/0x1c0 [ 166.971292] __dev_change_flags+0xa2/0x1b0 [ 166.980378] dev_change_flags+0x21/0x60 [ 166.988887] do_setlink+0x38d/0xf20 [ 166.996628] ? ep_poll_callback+0x1b9/0x240 [ 167.005910] ? __nla_validate_parse.llvm.10713395753544950386+0x80/0xd70 [ 167.020782] ? __wake_up_sync_key+0x52/0x80 [ 167.030066] ? __mutex_lock+0xff/0x550 [ 167.038382] ? security_capable+0x50/0x90 [ 167.047279] rtnl_setlink+0x1c9/0x210 [ 167.055403] ? ep_poll_callback+0x1b9/0x240 [ 167.064684] ? security_capable+0x50/0x90 [ 167.073579] rtnetlink_rcv_msg+0x2f9/0x310 [ 167.082667] ? rtnetlink_bind+0x30/0x30 [ 167.091173] netlink_rcv_skb+0xb1/0xe0 [ 167.099492] netlink_unicast+0x20f/0x2e0 [ 167.108191] netlink_sendmsg+0x389/0x420 [ 167.116896] __sys_sendto+0x158/0x1c0 [ 167.125024] __x64_sys_sendto+0x22/0x30 [ 167.133534] do_syscall_64+0x63/0x130 [ 167.141657] ? __irq_exit_rcu.llvm.17843942359718260576+0x52/0xd0 [ 167.155181] entry_SYSCALL_64_after_hwframe+0x4b/0x53
Impacted products
Vendor Product Version
Linux Linux Version: bb135e40129ddd254cfb474b58981313be79a631
Version: bb135e40129ddd254cfb474b58981313be79a631
Create a notification for this product.
   Linux Linux Version: 6.13
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/mellanox/mlx5/core/en_main.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "a275db45b4161d01716559dd7557db9ea0450952",
              "status": "affected",
              "version": "bb135e40129ddd254cfb474b58981313be79a631",
              "versionType": "git"
            },
            {
              "lessThan": "979284535aaf12a287a2f43d9d5dfcbdc1dc4cac",
              "status": "affected",
              "version": "bb135e40129ddd254cfb474b58981313be79a631",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/mellanox/mlx5/core/en_main.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.13"
            },
            {
              "lessThan": "6.13",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.13.*",
              "status": "unaffected",
              "version": "6.13.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.14-rc1",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: add missing cpu_to_node to kvzalloc_node in mlx5e_open_xdpredirect_sq\n\nkvzalloc_node is not doing a runtime check on the node argument\n(__alloc_pages_node_noprof does have a VM_BUG_ON, but it expands to\nnothing on !CONFIG_DEBUG_VM builds), so doing any ethtool/netlink\noperation that calls mlx5e_open on a CPU that\u0027s larger that MAX_NUMNODES\ntriggers OOB access and panic (see the trace below).\n\nAdd missing cpu_to_node call to convert cpu id to node id.\n\n[  165.427394] mlx5_core 0000:5c:00.0 beth1: Link up\n[  166.479327] BUG: unable to handle page fault for address: 0000000800000010\n[  166.494592] #PF: supervisor read access in kernel mode\n[  166.505995] #PF: error_code(0x0000) - not-present page\n...\n[  166.816958] Call Trace:\n[  166.822380]  \u003cTASK\u003e\n[  166.827034]  ? __die_body+0x64/0xb0\n[  166.834774]  ? page_fault_oops+0x2cd/0x3f0\n[  166.843862]  ? exc_page_fault+0x63/0x130\n[  166.852564]  ? asm_exc_page_fault+0x22/0x30\n[  166.861843]  ? __kvmalloc_node_noprof+0x43/0xd0\n[  166.871897]  ? get_partial_node+0x1c/0x320\n[  166.880983]  ? deactivate_slab+0x269/0x2b0\n[  166.890069]  ___slab_alloc+0x521/0xa90\n[  166.898389]  ? __kvmalloc_node_noprof+0x43/0xd0\n[  166.908442]  __kmalloc_node_noprof+0x216/0x3f0\n[  166.918302]  ? __kvmalloc_node_noprof+0x43/0xd0\n[  166.928354]  __kvmalloc_node_noprof+0x43/0xd0\n[  166.938021]  mlx5e_open_channels+0x5e2/0xc00\n[  166.947496]  mlx5e_open_locked+0x3e/0xf0\n[  166.956201]  mlx5e_open+0x23/0x50\n[  166.963551]  __dev_open+0x114/0x1c0\n[  166.971292]  __dev_change_flags+0xa2/0x1b0\n[  166.980378]  dev_change_flags+0x21/0x60\n[  166.988887]  do_setlink+0x38d/0xf20\n[  166.996628]  ? ep_poll_callback+0x1b9/0x240\n[  167.005910]  ? __nla_validate_parse.llvm.10713395753544950386+0x80/0xd70\n[  167.020782]  ? __wake_up_sync_key+0x52/0x80\n[  167.030066]  ? __mutex_lock+0xff/0x550\n[  167.038382]  ? security_capable+0x50/0x90\n[  167.047279]  rtnl_setlink+0x1c9/0x210\n[  167.055403]  ? ep_poll_callback+0x1b9/0x240\n[  167.064684]  ? security_capable+0x50/0x90\n[  167.073579]  rtnetlink_rcv_msg+0x2f9/0x310\n[  167.082667]  ? rtnetlink_bind+0x30/0x30\n[  167.091173]  netlink_rcv_skb+0xb1/0xe0\n[  167.099492]  netlink_unicast+0x20f/0x2e0\n[  167.108191]  netlink_sendmsg+0x389/0x420\n[  167.116896]  __sys_sendto+0x158/0x1c0\n[  167.125024]  __x64_sys_sendto+0x22/0x30\n[  167.133534]  do_syscall_64+0x63/0x130\n[  167.141657]  ? __irq_exit_rcu.llvm.17843942359718260576+0x52/0xd0\n[  167.155181]  entry_SYSCALL_64_after_hwframe+0x4b/0x53"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-27T02:07:27.369Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/a275db45b4161d01716559dd7557db9ea0450952"
        },
        {
          "url": "https://git.kernel.org/stable/c/979284535aaf12a287a2f43d9d5dfcbdc1dc4cac"
        }
      ],
      "title": "net/mlx5e: add missing cpu_to_node to kvzalloc_node in mlx5e_open_xdpredirect_sq",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-21717",
    "datePublished": "2025-02-27T02:07:27.369Z",
    "dateReserved": "2024-12-29T08:45:45.753Z",
    "dateUpdated": "2025-02-27T02:07:27.369Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-21717\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-02-27T02:15:15.373\",\"lastModified\":\"2025-02-27T02:15:15.373\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet/mlx5e: add missing cpu_to_node to kvzalloc_node in mlx5e_open_xdpredirect_sq\\n\\nkvzalloc_node is not doing a runtime check on the node argument\\n(__alloc_pages_node_noprof does have a VM_BUG_ON, but it expands to\\nnothing on !CONFIG_DEBUG_VM builds), so doing any ethtool/netlink\\noperation that calls mlx5e_open on a CPU that\u0027s larger that MAX_NUMNODES\\ntriggers OOB access and panic (see the trace below).\\n\\nAdd missing cpu_to_node call to convert cpu id to node id.\\n\\n[  165.427394] mlx5_core 0000:5c:00.0 beth1: Link up\\n[  166.479327] BUG: unable to handle page fault for address: 0000000800000010\\n[  166.494592] #PF: supervisor read access in kernel mode\\n[  166.505995] #PF: error_code(0x0000) - not-present page\\n...\\n[  166.816958] Call Trace:\\n[  166.822380]  \u003cTASK\u003e\\n[  166.827034]  ? __die_body+0x64/0xb0\\n[  166.834774]  ? page_fault_oops+0x2cd/0x3f0\\n[  166.843862]  ? exc_page_fault+0x63/0x130\\n[  166.852564]  ? asm_exc_page_fault+0x22/0x30\\n[  166.861843]  ? __kvmalloc_node_noprof+0x43/0xd0\\n[  166.871897]  ? get_partial_node+0x1c/0x320\\n[  166.880983]  ? deactivate_slab+0x269/0x2b0\\n[  166.890069]  ___slab_alloc+0x521/0xa90\\n[  166.898389]  ? __kvmalloc_node_noprof+0x43/0xd0\\n[  166.908442]  __kmalloc_node_noprof+0x216/0x3f0\\n[  166.918302]  ? __kvmalloc_node_noprof+0x43/0xd0\\n[  166.928354]  __kvmalloc_node_noprof+0x43/0xd0\\n[  166.938021]  mlx5e_open_channels+0x5e2/0xc00\\n[  166.947496]  mlx5e_open_locked+0x3e/0xf0\\n[  166.956201]  mlx5e_open+0x23/0x50\\n[  166.963551]  __dev_open+0x114/0x1c0\\n[  166.971292]  __dev_change_flags+0xa2/0x1b0\\n[  166.980378]  dev_change_flags+0x21/0x60\\n[  166.988887]  do_setlink+0x38d/0xf20\\n[  166.996628]  ? ep_poll_callback+0x1b9/0x240\\n[  167.005910]  ? __nla_validate_parse.llvm.10713395753544950386+0x80/0xd70\\n[  167.020782]  ? __wake_up_sync_key+0x52/0x80\\n[  167.030066]  ? __mutex_lock+0xff/0x550\\n[  167.038382]  ? security_capable+0x50/0x90\\n[  167.047279]  rtnl_setlink+0x1c9/0x210\\n[  167.055403]  ? ep_poll_callback+0x1b9/0x240\\n[  167.064684]  ? security_capable+0x50/0x90\\n[  167.073579]  rtnetlink_rcv_msg+0x2f9/0x310\\n[  167.082667]  ? rtnetlink_bind+0x30/0x30\\n[  167.091173]  netlink_rcv_skb+0xb1/0xe0\\n[  167.099492]  netlink_unicast+0x20f/0x2e0\\n[  167.108191]  netlink_sendmsg+0x389/0x420\\n[  167.116896]  __sys_sendto+0x158/0x1c0\\n[  167.125024]  __x64_sys_sendto+0x22/0x30\\n[  167.133534]  do_syscall_64+0x63/0x130\\n[  167.141657]  ? __irq_exit_rcu.llvm.17843942359718260576+0x52/0xd0\\n[  167.155181]  entry_SYSCALL_64_after_hwframe+0x4b/0x53\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/979284535aaf12a287a2f43d9d5dfcbdc1dc4cac\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a275db45b4161d01716559dd7557db9ea0450952\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.