| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" |
| }, |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix memory leak in aRFS after reset\n\nFix aRFS (accelerated Receive Flow Steering) structures memory leak by\nadding a checker to verify if aRFS memory is already allocated while\nconfiguring VSI. aRFS objects are allocated in two cases:\n- as part of VSI initialization (at probe), and\n- as part of reset handling\n\nHowever, VSI reconfiguration executed during reset involves memory\nallocation one more time, without prior releasing already allocated\nresources. This led to the memory leak with the following signature:\n\n[root@os-delivery ~]# cat /sys/kernel/debug/kmemleak\nunreferenced object 0xff3c1ca7252e6000 (size 8192):\n comm \"kworker/0:0\", pid 8, jiffies 4296833052\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc 0):\n [<ffffffff991ec485>] __kmalloc_cache_noprof+0x275/0x340\n [<ffffffffc0a6e06a>] ice_init_arfs+0x3a/0xe0 [ice]\n [<ffffffffc09f1027>] ice_vsi_cfg_def+0x607/0x850 [ice]\n [<ffffffffc09f244b>] ice_vsi_setup+0x5b/0x130 [ice]\n [<ffffffffc09c2131>] ice_init+0x1c1/0x460 [ice]\n [<ffffffffc09c64af>] ice_probe+0x2af/0x520 [ice]\n [<ffffffff994fbcd3>] local_pci_probe+0x43/0xa0\n [<ffffffff98f07103>] work_for_cpu_fn+0x13/0x20\n [<ffffffff98f0b6d9>] process_one_work+0x179/0x390\n [<ffffffff98f0c1e9>] worker_thread+0x239/0x340\n [<ffffffff98f14abc>] kthread+0xcc/0x100\n [<ffffffff98e45a6d>] ret_from_fork+0x2d/0x50\n [<ffffffff98e083ba>] ret_from_fork_asm+0x1a/0x30\n ..." |
| } |
| ], |
| "affected": [ |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "drivers/net/ethernet/intel/ice/ice_arfs.c" |
| ], |
| "versions": [ |
| { |
| "version": "28bf26724fdb0e02267d19e280d6717ee810a10d", |
| "lessThan": "ef2bc94059836a115430a6ad9d2838b0b34dc8f5", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "28bf26724fdb0e02267d19e280d6717ee810a10d", |
| "lessThan": "e6902101f34f098af59b0d1d8cf90c4124c02c6a", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "28bf26724fdb0e02267d19e280d6717ee810a10d", |
| "lessThan": "fcbacc47d16306c87ad1b820b7a575f6e9eae58b", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "28bf26724fdb0e02267d19e280d6717ee810a10d", |
| "lessThan": "5d30d256661fc11b6e73fac6c3783a702e1006a3", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "28bf26724fdb0e02267d19e280d6717ee810a10d", |
| "lessThan": "3b27e6e10a32589fcd293b8933ab6de9387a460e", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "28bf26724fdb0e02267d19e280d6717ee810a10d", |
| "lessThan": "78f3d64b30210c0e521c59357431aca14024cb79", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "28bf26724fdb0e02267d19e280d6717ee810a10d", |
| "lessThan": "23d97f18901ef5e4e264e3b1777fe65c760186b5", |
| "status": "affected", |
| "versionType": "git" |
| } |
| ] |
| }, |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "affected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "drivers/net/ethernet/intel/ice/ice_arfs.c" |
| ], |
| "versions": [ |
| { |
| "version": "5.8", |
| "status": "affected" |
| }, |
| { |
| "version": "0", |
| "lessThan": "5.8", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.10.236", |
| "lessThanOrEqual": "5.10.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.15.180", |
| "lessThanOrEqual": "5.15.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.1.132", |
| "lessThanOrEqual": "6.1.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.6.84", |
| "lessThanOrEqual": "6.6.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.12.20", |
| "lessThanOrEqual": "6.12.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.13.8", |
| "lessThanOrEqual": "6.13.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.14", |
| "lessThanOrEqual": "*", |
| "status": "unaffected", |
| "versionType": "original_commit_for_fix" |
| } |
| ] |
| } |
| ], |
| "cpeApplicability": [ |
| { |
| "nodes": [ |
| { |
| "operator": "OR", |
| "negate": false, |
| "cpeMatch": [ |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.8", |
| "versionEndExcluding": "5.10.236" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.8", |
| "versionEndExcluding": "5.15.180" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.8", |
| "versionEndExcluding": "6.1.132" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.8", |
| "versionEndExcluding": "6.6.84" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.8", |
| "versionEndExcluding": "6.12.20" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.8", |
| "versionEndExcluding": "6.13.8" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.8", |
| "versionEndExcluding": "6.14" |
| } |
| ] |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://git.kernel.org/stable/c/ef2bc94059836a115430a6ad9d2838b0b34dc8f5" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/e6902101f34f098af59b0d1d8cf90c4124c02c6a" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/fcbacc47d16306c87ad1b820b7a575f6e9eae58b" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/5d30d256661fc11b6e73fac6c3783a702e1006a3" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/3b27e6e10a32589fcd293b8933ab6de9387a460e" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/78f3d64b30210c0e521c59357431aca14024cb79" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/23d97f18901ef5e4e264e3b1777fe65c760186b5" |
| } |
| ], |
| "title": "ice: fix memory leak in aRFS after reset", |
| "x_generator": { |
| "engine": "bippy-1.2.0" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", |
| "cveID": "CVE-2025-21981", |
| "requesterUserId": "gregkh@kernel.org", |
| "serial": "1", |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |