Cyber Posture

CVE-2025-21855

High

Published: 12 March 2025

Published
12 March 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 2.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-21855 is a use-after-free vulnerability in the ibmvnic driver within the Linux kernel. The issue arises because, after successfully flushing a transmit buffer to the VIOS (Virtual I/O Server), the driver increments the tx_bytes statistic by accessing the skb->len field. This access is invalid since the VIOS can trigger an interrupt at any point afterward to free the skb memory, creating a race condition—particularly during low-power mode (LPM)—that leads to a slab-use-after-free, as evidenced by KASAN reports in ibmvnic_xmit.

A local attacker with low privileges can exploit this vulnerability with low attack complexity and no user interaction required. Successful exploitation could result in high confidentiality, integrity, and availability impacts, potentially allowing arbitrary code execution, data corruption, or system crashes via the use-after-free (CWE-416), with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Mitigation involves applying kernel patches from the referenced stable commits, including 093b0e5c9059, 25dddd01dcc8, 501ac6a7e21b, abaff2717470, and bdf5d13aa05e, which resolve the invalid skb reference after sending to VIOS. Security practitioners should update affected Linux kernels, particularly those using the ibmvnic driver on IBM Power systems.

Details

CWE(s)
CWE-416

Affected Products

linux
linux kernel
6.14 · 4.5 — 6.1.130 · 6.2 — 6.6.80 · 6.7 — 6.12.17

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local use-after-free in Linux kernel driver enables arbitrary code execution for privilege escalation from low-privileged user.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References