CVE-2025-21806
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2025-21806 affects the Linux kernel's network subsystem, specifically related to the net.core.devweight sysctl parameter. The vulnerability was discovered in January 2025 and involves a stability issue where setting net.core.devweight to zero can cause system instability. The issue affects Linux kernel versions up to 6.13.0-rc7 (Debian Security).

Technical details

The vulnerability occurs when the NAPI (New API) poll function processbacklog returns 0 and clears the NAPISTATESCHED bit of napi->state when napi's weight is set to 0. This causes the NAPI to be re-polled in netrxaction() until _dosoftirq() times out. Since the NAPISTATESCHED bit is cleared, napischedulerps() can be retriggered in enqueuetobacklog(), leading to a listadd double add condition (Kernel Commit).

Impact

The vulnerability can cause system instability and kernel warnings when exploited. The issue can be triggered using system-wide administrator privileges by setting the net.core.dev_weight parameter to zero, though the setting is not namespaced (Debian Security).

Mitigation and workarounds

The issue has been fixed by ensuring that net.core.devweight always remains non-zero through the implementation of procdointvecminmax with SYSCTLONE as the minimum value. The fix has been incorporated into newer kernel versions, and affected distributions have released patches (Kernel Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management