CVE-2025-22057: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: decrease cached dst counters in dst_release Upstream fix ac888d58869b ("net: do not delay dst_entries_add() in dst_release()") moved decrementing the dst count from dst_destroy to dst_release to avoid accessing already freed data in case of netns dismantle. However in case CONFIG_DST_CACHE is enabled and OvS+tunnels are used, this fix is incomplete as the same issue will be seen for cached dsts: Unable to handle kernel paging request at virtual address ffff5aabf6b5c000 Call trace: percpu_counter_add_batch+0x3c/0x160 (P) dst_release+0xec/0x108 dst_cache_destroy+0x68/0xd8 dst_destroy+0x13c/0x168 dst_destroy_rcu+0x1c/0xb0 rcu_do_batch+0x18c/0x7d0 rcu_core+0x174/0x378 rcu_core_si+0x18/0x30 Fix this by invalidating the cache, and thus decrementing cached dst counters, in dst_release too.
AI Analysis
Technical Summary
CVE-2025-22057 is a vulnerability in the Linux kernel related to the handling of destination cache (dst_cache) counters within the networking subsystem. The issue arises from an incomplete fix in the kernel's network stack, specifically in the functions managing cached destination entries (dst entries) used for routing and tunneling, including Open vSwitch (OvS) tunnels. The original fix moved the decrementing of dst counters from the dst_destroy function to dst_release to prevent use-after-free errors during network namespace dismantling. However, when CONFIG_DST_CACHE is enabled and OvS tunnels are in use, cached dst entries are not properly invalidated, leading to attempts to access already freed memory. This results in kernel paging faults and potential system crashes, as evidenced by the kernel call trace involving percpu_counter_add_batch and dst_release functions. The vulnerability is rooted in improper reference counting and cache invalidation of dst entries, which can cause kernel memory corruption and instability. The fix involves ensuring that cached dst counters are decremented and the cache invalidated within dst_release, preventing access to freed memory. This vulnerability affects Linux kernel versions identified by the commit hash d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8 and likely other versions with similar code paths and configurations. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with CONFIG_DST_CACHE enabled and utilizing Open vSwitch tunnels or similar networking configurations. Such environments are common in data centers, cloud infrastructure, and enterprise networks that rely on Linux-based virtualization and container orchestration platforms. The impact includes potential kernel panics or system crashes due to memory access violations, leading to denial of service (DoS) conditions. This can disrupt critical services, degrade network performance, and cause downtime. While there is no indication of direct remote code execution or privilege escalation, the instability can be exploited by attackers to cause persistent outages or to facilitate further attacks by destabilizing network infrastructure. Organizations with high availability requirements, such as financial institutions, telecommunications providers, and public sector entities, may face operational and reputational damage. Additionally, the complexity of the vulnerability in kernel networking code means that debugging and recovery might require specialized expertise, increasing incident response costs.
Mitigation Recommendations
European organizations should prioritize applying the upstream Linux kernel patch that properly invalidates cached dst entries and decrements their counters in dst_release. This requires updating to a fixed kernel version or backporting the patch if using long-term support (LTS) kernels. System administrators should audit their Linux environments to identify if CONFIG_DST_CACHE is enabled and if Open vSwitch or similar tunneling technologies are in use. Where possible, temporarily disabling CONFIG_DST_CACHE or avoiding the use of affected tunneling features can reduce exposure until patches are applied. Monitoring kernel logs for paging faults or dst_release-related errors can help detect exploitation attempts or crashes. Implementing robust kernel crash dump and analysis procedures will aid in rapid diagnosis. Network segmentation and limiting access to management interfaces can reduce the risk of exploitation. Finally, organizations should coordinate with Linux distribution vendors for timely security updates and verify patch deployment across all affected systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2025-22057: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: decrease cached dst counters in dst_release Upstream fix ac888d58869b ("net: do not delay dst_entries_add() in dst_release()") moved decrementing the dst count from dst_destroy to dst_release to avoid accessing already freed data in case of netns dismantle. However in case CONFIG_DST_CACHE is enabled and OvS+tunnels are used, this fix is incomplete as the same issue will be seen for cached dsts: Unable to handle kernel paging request at virtual address ffff5aabf6b5c000 Call trace: percpu_counter_add_batch+0x3c/0x160 (P) dst_release+0xec/0x108 dst_cache_destroy+0x68/0xd8 dst_destroy+0x13c/0x168 dst_destroy_rcu+0x1c/0xb0 rcu_do_batch+0x18c/0x7d0 rcu_core+0x174/0x378 rcu_core_si+0x18/0x30 Fix this by invalidating the cache, and thus decrementing cached dst counters, in dst_release too.
AI-Powered Analysis
Technical Analysis
CVE-2025-22057 is a vulnerability in the Linux kernel related to the handling of destination cache (dst_cache) counters within the networking subsystem. The issue arises from an incomplete fix in the kernel's network stack, specifically in the functions managing cached destination entries (dst entries) used for routing and tunneling, including Open vSwitch (OvS) tunnels. The original fix moved the decrementing of dst counters from the dst_destroy function to dst_release to prevent use-after-free errors during network namespace dismantling. However, when CONFIG_DST_CACHE is enabled and OvS tunnels are in use, cached dst entries are not properly invalidated, leading to attempts to access already freed memory. This results in kernel paging faults and potential system crashes, as evidenced by the kernel call trace involving percpu_counter_add_batch and dst_release functions. The vulnerability is rooted in improper reference counting and cache invalidation of dst entries, which can cause kernel memory corruption and instability. The fix involves ensuring that cached dst counters are decremented and the cache invalidated within dst_release, preventing access to freed memory. This vulnerability affects Linux kernel versions identified by the commit hash d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8 and likely other versions with similar code paths and configurations. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with CONFIG_DST_CACHE enabled and utilizing Open vSwitch tunnels or similar networking configurations. Such environments are common in data centers, cloud infrastructure, and enterprise networks that rely on Linux-based virtualization and container orchestration platforms. The impact includes potential kernel panics or system crashes due to memory access violations, leading to denial of service (DoS) conditions. This can disrupt critical services, degrade network performance, and cause downtime. While there is no indication of direct remote code execution or privilege escalation, the instability can be exploited by attackers to cause persistent outages or to facilitate further attacks by destabilizing network infrastructure. Organizations with high availability requirements, such as financial institutions, telecommunications providers, and public sector entities, may face operational and reputational damage. Additionally, the complexity of the vulnerability in kernel networking code means that debugging and recovery might require specialized expertise, increasing incident response costs.
Mitigation Recommendations
European organizations should prioritize applying the upstream Linux kernel patch that properly invalidates cached dst entries and decrements their counters in dst_release. This requires updating to a fixed kernel version or backporting the patch if using long-term support (LTS) kernels. System administrators should audit their Linux environments to identify if CONFIG_DST_CACHE is enabled and if Open vSwitch or similar tunneling technologies are in use. Where possible, temporarily disabling CONFIG_DST_CACHE or avoiding the use of affected tunneling features can reduce exposure until patches are applied. Monitoring kernel logs for paging faults or dst_release-related errors can help detect exploitation attempts or crashes. Implementing robust kernel crash dump and analysis procedures will aid in rapid diagnosis. Network segmentation and limiting access to management interfaces can reduce the risk of exploitation. Finally, organizations should coordinate with Linux distribution vendors for timely security updates and verify patch deployment across all affected systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.812Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9831c4522896dcbe7f63
Added to database: 5/21/2025, 9:09:05 AM
Last enriched: 7/3/2025, 8:41:13 PM
Last updated: 8/12/2025, 5:38:40 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.