EGI SVG Advisories

Advisory-EGI-SVG-2025-07

CRITICAL risk Linux Kernel Vulnerability

Date: 2025-05-28 Updated: 2025-07-23

RedHat has released Kernel updates to fix several kernel vulnerabilities, one of which (CVE-2025-21756) the EGI SVG considers ‘CRITICAL’ for the EGI infrastructure. [R 1]

IDs AND CVSS SCORE

EGI SVG ID : EGI-SVG-2025-07

CVE ID : CVE-2025-21756

CVSS Score : 7.8 [R 1]

ACTIONS REQUIRED/RECOMMENDED

All affected sites are required to react urgently, using references below.

All running resources MUST be patched or mitigated by 2025-06-06 00:00 UTC

Sites failing to act and/or respond to requests from the EGI CSIRT team risk site suspension.

MORE INFORMATION

For the EGI infrastructure, CVE-2025-21756 is considered ‘CRITICAL’ even though the CVSS score fits more with ‘HIGH’ risk, as explained next.

Although it is only exploitable locally, that mitigation is insufficient for Grid Worker Nodes and shared User Interfaces. In practice this means it may be widely exploitable in our infrastructure.

Furthermore, although the vulnerability is particularly associated with the use of VMware, the corresponding driver is also usable with other VM systems and has been found to be readily available even on hosts that do not have any VM usage set up. Please refer to the mitigation below.

A public exploit is available [R 6], [R 7]

MITIGATION

Sufficient mitigation is to disable the affected driver, as detailed in [R 1].

STATUS OF THIS ADVISORY

TLP:CLEAR information - Unlimited distribution

https://advisories.egi.eu/Advisory-EGI-SVG-2025-07

https://advisories.egi.eu/Advisory-SVG-CVE-2025-21756

Minor updates may be made without re-distribution to the sites.

CONTACT AND OTHER INFORMATION ON SVG


This advisory is subject to the Creative Commons licence 
https://creativecommons.org/licenses/by/4.0/ and
the EGI (https://www.egi.eu/) Software Vulnerability Group 
must be credited. ---

Comments or questions should be sent to svg-rat at mailman.egi.eu

Vulnerabilities relevant for EGI can be reported at report-vulnerability at egi.eu

(see [R 99] for further details, and other information on SVG)

REFERENCES

CREDITS

SVG was alerted to this vulnerability by Mischa Salle