CVE-2025-22025: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: nfsd: put dl_stid if fail to queue dl_recall Before calling nfsd4_run_cb to queue dl_recall to the callback_wq, we increment the reference count of dl_stid. We expect that after the corresponding work_struct is processed, the reference count of dl_stid will be decremented through the callback function nfsd4_cb_recall_release. However, if the call to nfsd4_run_cb fails, the incremented reference count of dl_stid will not be decremented correspondingly, leading to the following nfs4_stid leak: unreferenced object 0xffff88812067b578 (size 344): comm "nfsd", pid 2761, jiffies 4295044002 (age 5541.241s) hex dump (first 32 bytes): 01 00 00 00 6b 6b 6b 6b b8 02 c0 e2 81 88 ff ff ....kkkk........ 00 6b 6b 6b 6b 6b 6b 6b 00 00 00 00 ad 4e ad de .kkkkkkk.....N.. backtrace: kmem_cache_alloc+0x4b9/0x700 nfsd4_process_open1+0x34/0x300 nfsd4_open+0x2d1/0x9d0 nfsd4_proc_compound+0x7a2/0xe30 nfsd_dispatch+0x241/0x3e0 svc_process_common+0x5d3/0xcc0 svc_process+0x2a3/0x320 nfsd+0x180/0x2e0 kthread+0x199/0x1d0 ret_from_fork+0x30/0x50 ret_from_fork_asm+0x1b/0x30 unreferenced object 0xffff8881499f4d28 (size 368): comm "nfsd", pid 2761, jiffies 4295044005 (age 5541.239s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 30 4d 9f 49 81 88 ff ff ........0M.I.... 30 4d 9f 49 81 88 ff ff 20 00 00 00 01 00 00 00 0M.I.... ....... backtrace: kmem_cache_alloc+0x4b9/0x700 nfs4_alloc_stid+0x29/0x210 alloc_init_deleg+0x92/0x2e0 nfs4_set_delegation+0x284/0xc00 nfs4_open_delegation+0x216/0x3f0 nfsd4_process_open2+0x2b3/0xee0 nfsd4_open+0x770/0x9d0 nfsd4_proc_compound+0x7a2/0xe30 nfsd_dispatch+0x241/0x3e0 svc_process_common+0x5d3/0xcc0 svc_process+0x2a3/0x320 nfsd+0x180/0x2e0 kthread+0x199/0x1d0 ret_from_fork+0x30/0x50 ret_from_fork_asm+0x1b/0x30 Fix it by checking the result of nfsd4_run_cb and call nfs4_put_stid if fail to queue dl_recall.
AI Analysis
Technical Summary
CVE-2025-22025 is a vulnerability identified in the Linux kernel's NFS server daemon (nfsd), specifically related to the handling of delegation state identifiers (dl_stid) in the NFSv4 protocol implementation. The issue arises in the function responsible for queuing recall callbacks (dl_recall) to the kernel's callback work queue (callback_wq). When nfsd4_run_cb is called to queue a dl_recall, the reference count of the associated dl_stid object is incremented to ensure proper lifecycle management. The design expects that once the callback work_struct is processed, the reference count will be decremented via the callback function nfsd4_cb_recall_release. However, if nfsd4_run_cb fails to queue the callback, the incremented reference count is not decremented, resulting in a reference count leak. This leak causes unreferenced dl_stid objects to accumulate in memory, leading to a memory leak within the NFS server process. The technical details include kernel memory allocation backtraces showing the leak and the affected code paths, such as nfsd4_process_open, nfsd4_open, and nfsd4_proc_compound. The fix involves checking the return value of nfsd4_run_cb and calling nfs4_put_stid to decrement the reference count if queuing fails, preventing the leak. This vulnerability affects Linux kernel versions identified by the given commit hashes and was published on April 16, 2025. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability primarily impacts systems running Linux kernels with the vulnerable NFS server implementation, particularly those using NFSv4 delegations. The memory leak caused by unreleased dl_stid objects can lead to gradual resource exhaustion on NFS servers, potentially degrading performance or causing service instability over time. In environments with high NFS delegation usage, such as large-scale file servers, cloud infrastructure, and enterprise storage systems, this could result in denial of service conditions if the leak is severe and unmitigated. Confidentiality and integrity are not directly impacted by this vulnerability since it does not allow unauthorized access or code execution. However, availability can be affected due to resource depletion. European organizations relying on Linux-based NFS servers for critical file sharing and storage services may experience operational disruptions. Additionally, the vulnerability could increase maintenance overhead and require more frequent reboots or manual interventions to clear leaked resources. Given the widespread use of Linux in European data centers, cloud providers, and enterprises, the impact could be significant if left unpatched.
Mitigation Recommendations
To mitigate CVE-2025-22025, European organizations should: 1) Apply the official Linux kernel patches that address the reference count leak in the nfsd4_run_cb function as soon as they become available from trusted Linux distributions or kernel maintainers. 2) Monitor NFS server memory usage and resource consumption closely to detect abnormal growth patterns indicative of leaks. 3) Implement proactive resource management strategies such as automated restarts or recycling of the nfsd service during maintenance windows to minimize service disruption. 4) Limit the use of NFS delegations where possible or configure delegation timeouts to reduce the potential impact of leaks. 5) Employ kernel live patching solutions if available to apply fixes without requiring full system reboots, minimizing downtime. 6) Maintain an inventory of Linux kernel versions in use across infrastructure to prioritize patching efforts on vulnerable systems. 7) Engage with Linux distribution vendors for timely security updates and advisories related to this vulnerability. These steps go beyond generic advice by focusing on operational monitoring, resource management, and leveraging vendor support to ensure timely remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2025-22025: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: nfsd: put dl_stid if fail to queue dl_recall Before calling nfsd4_run_cb to queue dl_recall to the callback_wq, we increment the reference count of dl_stid. We expect that after the corresponding work_struct is processed, the reference count of dl_stid will be decremented through the callback function nfsd4_cb_recall_release. However, if the call to nfsd4_run_cb fails, the incremented reference count of dl_stid will not be decremented correspondingly, leading to the following nfs4_stid leak: unreferenced object 0xffff88812067b578 (size 344): comm "nfsd", pid 2761, jiffies 4295044002 (age 5541.241s) hex dump (first 32 bytes): 01 00 00 00 6b 6b 6b 6b b8 02 c0 e2 81 88 ff ff ....kkkk........ 00 6b 6b 6b 6b 6b 6b 6b 00 00 00 00 ad 4e ad de .kkkkkkk.....N.. backtrace: kmem_cache_alloc+0x4b9/0x700 nfsd4_process_open1+0x34/0x300 nfsd4_open+0x2d1/0x9d0 nfsd4_proc_compound+0x7a2/0xe30 nfsd_dispatch+0x241/0x3e0 svc_process_common+0x5d3/0xcc0 svc_process+0x2a3/0x320 nfsd+0x180/0x2e0 kthread+0x199/0x1d0 ret_from_fork+0x30/0x50 ret_from_fork_asm+0x1b/0x30 unreferenced object 0xffff8881499f4d28 (size 368): comm "nfsd", pid 2761, jiffies 4295044005 (age 5541.239s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 30 4d 9f 49 81 88 ff ff ........0M.I.... 30 4d 9f 49 81 88 ff ff 20 00 00 00 01 00 00 00 0M.I.... ....... backtrace: kmem_cache_alloc+0x4b9/0x700 nfs4_alloc_stid+0x29/0x210 alloc_init_deleg+0x92/0x2e0 nfs4_set_delegation+0x284/0xc00 nfs4_open_delegation+0x216/0x3f0 nfsd4_process_open2+0x2b3/0xee0 nfsd4_open+0x770/0x9d0 nfsd4_proc_compound+0x7a2/0xe30 nfsd_dispatch+0x241/0x3e0 svc_process_common+0x5d3/0xcc0 svc_process+0x2a3/0x320 nfsd+0x180/0x2e0 kthread+0x199/0x1d0 ret_from_fork+0x30/0x50 ret_from_fork_asm+0x1b/0x30 Fix it by checking the result of nfsd4_run_cb and call nfs4_put_stid if fail to queue dl_recall.
AI-Powered Analysis
Technical Analysis
CVE-2025-22025 is a vulnerability identified in the Linux kernel's NFS server daemon (nfsd), specifically related to the handling of delegation state identifiers (dl_stid) in the NFSv4 protocol implementation. The issue arises in the function responsible for queuing recall callbacks (dl_recall) to the kernel's callback work queue (callback_wq). When nfsd4_run_cb is called to queue a dl_recall, the reference count of the associated dl_stid object is incremented to ensure proper lifecycle management. The design expects that once the callback work_struct is processed, the reference count will be decremented via the callback function nfsd4_cb_recall_release. However, if nfsd4_run_cb fails to queue the callback, the incremented reference count is not decremented, resulting in a reference count leak. This leak causes unreferenced dl_stid objects to accumulate in memory, leading to a memory leak within the NFS server process. The technical details include kernel memory allocation backtraces showing the leak and the affected code paths, such as nfsd4_process_open, nfsd4_open, and nfsd4_proc_compound. The fix involves checking the return value of nfsd4_run_cb and calling nfs4_put_stid to decrement the reference count if queuing fails, preventing the leak. This vulnerability affects Linux kernel versions identified by the given commit hashes and was published on April 16, 2025. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability primarily impacts systems running Linux kernels with the vulnerable NFS server implementation, particularly those using NFSv4 delegations. The memory leak caused by unreleased dl_stid objects can lead to gradual resource exhaustion on NFS servers, potentially degrading performance or causing service instability over time. In environments with high NFS delegation usage, such as large-scale file servers, cloud infrastructure, and enterprise storage systems, this could result in denial of service conditions if the leak is severe and unmitigated. Confidentiality and integrity are not directly impacted by this vulnerability since it does not allow unauthorized access or code execution. However, availability can be affected due to resource depletion. European organizations relying on Linux-based NFS servers for critical file sharing and storage services may experience operational disruptions. Additionally, the vulnerability could increase maintenance overhead and require more frequent reboots or manual interventions to clear leaked resources. Given the widespread use of Linux in European data centers, cloud providers, and enterprises, the impact could be significant if left unpatched.
Mitigation Recommendations
To mitigate CVE-2025-22025, European organizations should: 1) Apply the official Linux kernel patches that address the reference count leak in the nfsd4_run_cb function as soon as they become available from trusted Linux distributions or kernel maintainers. 2) Monitor NFS server memory usage and resource consumption closely to detect abnormal growth patterns indicative of leaks. 3) Implement proactive resource management strategies such as automated restarts or recycling of the nfsd service during maintenance windows to minimize service disruption. 4) Limit the use of NFS delegations where possible or configure delegation timeouts to reduce the potential impact of leaks. 5) Employ kernel live patching solutions if available to apply fixes without requiring full system reboots, minimizing downtime. 6) Maintain an inventory of Linux kernel versions in use across infrastructure to prioritize patching efforts on vulnerable systems. 7) Engage with Linux distribution vendors for timely security updates and advisories related to this vulnerability. These steps go beyond generic advice by focusing on operational monitoring, resource management, and leveraging vendor support to ensure timely remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.807Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9831c4522896dcbe7eb0
Added to database: 5/21/2025, 9:09:05 AM
Last enriched: 7/3/2025, 7:56:04 PM
Last updated: 8/1/2025, 7:34:56 PM
Views: 10
Related Threats
CVE-2025-9108: Improper Restriction of Rendered UI Layers in Portabilis i-Diario
MediumCVE-2025-9107: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9106: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9105: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9104: Cross Site Scripting in Portabilis i-Diario
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.