CVE-2025-21662
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/01/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/mlx5: Fix variable not being completed when function returns<br />
<br />
When cmd_alloc_index(), fails cmd_work_handler() needs<br />
to complete ent->slotted before returning early.<br />
Otherwise the task which issued the command may hang:<br />
<br />
mlx5_core 0000:01:00.0: cmd_work_handler:877:(pid 3880418): failed to allocate command entry<br />
INFO: task kworker/13:2:4055883 blocked for more than 120 seconds.<br />
Not tainted 4.19.90-25.44.v2101.ky10.aarch64 #1<br />
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.<br />
kworker/13:2 D 0 4055883 2 0x00000228<br />
Workqueue: events mlx5e_tx_dim_work [mlx5_core]<br />
Call trace:<br />
__switch_to+0xe8/0x150<br />
__schedule+0x2a8/0x9b8<br />
schedule+0x2c/0x88<br />
schedule_timeout+0x204/0x478<br />
wait_for_common+0x154/0x250<br />
wait_for_completion+0x28/0x38<br />
cmd_exec+0x7a0/0xa00 [mlx5_core]<br />
mlx5_cmd_exec+0x54/0x80 [mlx5_core]<br />
mlx5_core_modify_cq+0x6c/0x80 [mlx5_core]<br />
mlx5_core_modify_cq_moderation+0xa0/0xb8 [mlx5_core]<br />
mlx5e_tx_dim_work+0x54/0x68 [mlx5_core]<br />
process_one_work+0x1b0/0x448<br />
worker_thread+0x54/0x468<br />
kthread+0x134/0x138<br />
ret_from_fork+0x10/0x18
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.93 (including) | 6.1.125 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.33 (including) | 6.6.72 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8.12 (including) | 6.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9.3 (including) | 6.12.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0e2909c6bec9048f49d0c8e16887c63b50b14647
- https://git.kernel.org/stable/c/229cc10284373fbe754e623b7033dca7e7470ec8
- https://git.kernel.org/stable/c/36124081f6ffd9dfaad48830bdf106bb82a9457d
- https://git.kernel.org/stable/c/f0a2808767ac39f64b1d9a0ff865c255073cf3d4
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



