CVE-2025-21890

Source
https://cve.org/CVERecord?id=CVE-2025-21890
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21890.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21890
Downstream
Related
Published
2025-03-27T14:57:16.525Z
Modified
2026-03-20T12:41:13.530918Z
Summary
idpf: fix checksums set in idpf_rx_rsc()
Details

In the Linux kernel, the following vulnerability has been resolved:

idpf: fix checksums set in idpfrxrsc()

idpfrxrsc() uses skbtransportoffset(skb) while the transport header is not set yet.

This triggers the following warning for CONFIGDEBUGNET=y builds.

DEBUGNETWARNONONCE(!skbtransportheaderwasset(skb))

[ 69.261620] WARNING: CPU: 7 PID: 0 at ./include/linux/skbuff.h:3020 idpfvportsplitqnapipoll (include/linux/skbuff.h:3020) idpf [ 69.261629] Modules linked in: vfat fat dummy bridge inteluncorefrequencytpmi inteluncorefrequencycommon intelvsectpmi idpf intelvsec cdcncm cdceem cdcether usbnet mii xhcipci xhcihcd ehcipci ehcihcd libeth [ 69.261644] CPU: 7 UID: 0 PID: 0 Comm: swapper/7 Tainted: G S W 6.14.0-smp-DEV #1697 [ 69.261648] Tainted: [S]=CPUOUTOFSPEC, [W]=WARN [ 69.261650] RIP: 0010:idpfvportsplitqnapi_poll (include/linux/skbuff.h:3020) idpf [ 69.261677] ? __warn (kernel/panic.c:242 kernel/panic.c:748) [ 69.261682] ? idpfvportsplitqnapipoll (include/linux/skbuff.h:3020) idpf [ 69.261687] ? reportbug (lib/bug.c:?) [ 69.261690] ? handlebug (arch/x86/kernel/traps.c:285) [ 69.261694] ? excinvalidop (arch/x86/kernel/traps.c:309) [ 69.261697] ? asmexcinvalid_op (arch/x86/include/asm/idtentry.h:621) [ 69.261700] ? __pfxidpfvportsplitqnapipoll (drivers/net/ethernet/intel/idpf/idpftxrx.c:4011) idpf [ 69.261704] ? idpfvportsplitqnapipoll (include/linux/skbuff.h:3020) idpf [ 69.261708] ? idpfvportsplitqnapipoll (drivers/net/ethernet/intel/idpf/idpf_txrx.c:3072) idpf [ 69.261712] __napipoll (net/core/dev.c:7194) [ 69.261716] netrx_action (net/core/dev.c:7265) [ 69.261718] ? __qdiscrun (net/sched/schgeneric.c:293) [ 69.261721] ? schedclock (arch/x86/include/asm/preempt.h:84 arch/x86/kernel/tsc.c:288) [ 69.261726] handlesoftirqs (kernel/softirq.c:561)

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21890.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3a8845af66edb340ba9210bb8a0da040c7d6e590
Fixed
4279bbebe00ffdbfd1a77567961886e35465cbdc
Fixed
57e68f256911f3ab4b997141975561646ccbbb8c
Fixed
674fcb4f4a7e3e277417a01788cc6daae47c3804

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21890.json"