Bug 2414741 (CVE-2025-40185) - CVE-2025-40185 kernel: ice: ice_adapter: release xa entry on adapter allocation failure
Summary: CVE-2025-40185 kernel: ice: ice_adapter: release xa entry on adapter allocati...
Keywords:
Status: NEW
Alias: CVE-2025-40185
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-11-12 23:03 UTC by OSIDB Bzimport
Modified: 2025-12-08 14:42 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:22405 0 None None None 2025-12-01 10:39:13 UTC
Red Hat Product Errata RHSA-2025:22854 0 None None None 2025-12-08 14:42:21 UTC

Description OSIDB Bzimport 2025-11-12 23:03:48 UTC
In the Linux kernel, the following vulnerability has been resolved:

ice: ice_adapter: release xa entry on adapter allocation failure

When ice_adapter_new() fails, the reserved XArray entry created by
xa_insert() is not released. This causes subsequent insertions at
the same index to return -EBUSY, potentially leading to
NULL pointer dereferences.

Reorder the operations as suggested by Przemek Kitszel:
1. Check if adapter already exists (xa_load)
2. Reserve the XArray slot (xa_reserve)
3. Allocate the adapter (ice_adapter_new)
4. Store the adapter (xa_store)

Comment 4 errata-xmlrpc 2025-12-01 10:39:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:22405 https://access.redhat.com/errata/RHSA-2025:22405

Comment 5 errata-xmlrpc 2025-12-08 14:42:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:22854 https://access.redhat.com/errata/RHSA-2025:22854


Note You need to log in before you can comment on or make changes to this bug.