Cyber Posture

CVE-2025-21883

High

Published: 27 March 2025

Published
27 March 2025
Modified
29 October 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 9.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.

Security Summary

CVE-2025-21883 is a use-after-free vulnerability (CWE-416) in the Linux kernel's ice driver, which handles Intel Ethernet controllers supporting SR-IOV. The issue occurs during VF deinitialization in the error path of ice_ena_vfs(): if it fails after ice_create_vf_entries(), the function frees all VFs without removing them from the snapshot PF-VF mailbox list, resulting in list corruption. This can trigger a kernel BUG in list_add or a KASAN-reported use-after-free, as seen in stack traces from ice_mbx_init_vf_info and ice_sriov_configure. The vulnerability carries a CVSS v3.1 score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

A local attacker with low privileges can exploit this by reproducing the failure scenario, such as configuring the physical function (PF) with devlink dev eswitch set to switchdev mode, enabling the interface with ip link set up and promiscuous mode, then toggling SR-IOV VFs via /sys/class/net/$PF/device/sriov_numvfs. This triggers the faulty error path during VF creation, leading to list corruption or use-after-free in VF initialization. Successful exploitation can cause kernel panics or memory corruption, potentially enabling privilege escalation, data tampering, or denial of service given the high confidentiality, integrity, and availability impacts.

Mitigation requires applying upstream kernel patches from the referenced stable commits, which move VF removal from the PF-VF mailbox list to ice_free_vf_entries()—a function already called in other VF removal paths, including ice_free_vfs(). Relevant patches include commits 34393fd78d71, 3c01102bec95, 79990cf5e7ad, and a4880583f88d, available at git.kernel.org/stable. Security practitioners should update affected Linux distributions' kernels supporting ice driver SR-IOV configurations as soon as patches propagate.

Details

CWE(s)
CWE-416

Affected Products

linux
linux kernel
6.14 · 6.4 — 6.6.81 · 6.7 — 6.12.18 · 6.13 — 6.13.6

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Local use-after-free in kernel driver enables exploitation for privilege escalation (T1068) or denial of service via kernel panic/memory corruption (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References