CVE-2025-22060
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/04/2025
Last modified:
17/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: mvpp2: Prevent parser TCAM memory corruption<br />
<br />
Protect the parser TCAM/SRAM memory, and the cached (shadow) SRAM<br />
information, from concurrent modifications.<br />
<br />
Both the TCAM and SRAM tables are indirectly accessed by configuring<br />
an index register that selects the row to read or write to. This means<br />
that operations must be atomic in order to, e.g., avoid spreading<br />
writes across multiple rows. Since the shadow SRAM array is used to<br />
find free rows in the hardware table, it must also be protected in<br />
order to avoid TOCTOU errors where multiple cores allocate the same<br />
row.<br />
<br />
This issue was detected in a situation where `mvpp2_set_rx_mode()` ran<br />
concurrently on two CPUs. In this particular case the<br />
MVPP2_PE_MAC_UC_PROMISCUOUS entry was corrupted, causing the<br />
classifier unit to drop all incoming unicast - indicated by the<br />
`rx_classifier_drops` counter.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/46c1e23e34c9d1eaadf37f88216d9d8ce0d0bcee
- https://git.kernel.org/stable/c/5b0ae1723a7d9574ae1aee7d9cf9757a30069865
- https://git.kernel.org/stable/c/96844075226b49af25a69a1d084b648ec2d9b08d
- https://git.kernel.org/stable/c/b3f48a41a00d6d8d9c6fe09ae47dd21c8c1c8b03
- https://git.kernel.org/stable/c/e3711163d14d02af9005e4cdad30899c565f13fb
- https://git.kernel.org/stable/c/e64e9b6e86b39db3baa576fd73da73533b54cb2d
- https://git.kernel.org/stable/c/fcbfb54a0269875cf3cd6a2bff4f85a2e0a0b552