CVE-2025-22057: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: decrease cached dst counters in dst_release Upstream fix ac888d58869b ("net: do not delay dst_entries_add() in dst_release()") moved decrementing the dst count from dst_destroy to dst_release to avoid accessing already freed data in case of netns dismantle. However in case CONFIG_DST_CACHE is enabled and OvS+tunnels are used, this fix is incomplete as the same issue will be seen for cached dsts: Unable to handle kernel paging request at virtual address ffff5aabf6b5c000 Call trace: percpu_counter_add_batch+0x3c/0x160 (P) dst_release+0xec/0x108 dst_cache_destroy+0x68/0xd8 dst_destroy+0x13c/0x168 dst_destroy_rcu+0x1c/0xb0 rcu_do_batch+0x18c/0x7d0 rcu_core+0x174/0x378 rcu_core_si+0x18/0x30 Fix this by invalidating the cache, and thus decrementing cached dst counters, in dst_release too.
AI Analysis
Technical Summary
CVE-2025-22057 is a vulnerability in the Linux kernel related to the handling of destination cache (dst_cache) counters within the networking subsystem. The issue arises from an incomplete fix in the kernel's network stack, specifically in the functions managing cached destination entries (dst entries) used for routing and tunneling, including Open vSwitch (OvS) tunnels. The original fix moved the decrementing of dst counters from the dst_destroy function to dst_release to prevent use-after-free errors during network namespace dismantling. However, when CONFIG_DST_CACHE is enabled and OvS tunnels are in use, cached dst entries are not properly invalidated, leading to attempts to access already freed memory. This results in kernel paging faults and potential system crashes, as evidenced by the kernel call trace involving percpu_counter_add_batch and dst_release functions. The vulnerability is rooted in improper reference counting and cache invalidation of dst entries, which can cause kernel memory corruption and instability. The fix involves ensuring that cached dst counters are decremented and the cache invalidated within dst_release, preventing access to freed memory. This vulnerability affects Linux kernel versions identified by the commit hash d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8 and likely other versions with similar code paths and configurations. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with CONFIG_DST_CACHE enabled and utilizing Open vSwitch tunnels or similar networking configurations. Such environments are common in data centers, cloud infrastructure, and enterprise networks that rely on Linux-based virtualization and container orchestration platforms. The impact includes potential kernel panics or system crashes due to memory access violations, leading to denial of service (DoS) conditions. This can disrupt critical services, degrade network performance, and cause downtime. While there is no indication of direct remote code execution or privilege escalation, the instability can be exploited by attackers to cause persistent outages or to facilitate further attacks by destabilizing network infrastructure. Organizations with high availability requirements, such as financial institutions, telecommunications providers, and public sector entities, may face operational and reputational damage. Additionally, the complexity of the vulnerability in kernel networking code means that debugging and recovery might require specialized expertise, increasing incident response costs.
Mitigation Recommendations
European organizations should prioritize applying the upstream Linux kernel patch that properly invalidates cached dst entries and decrements their counters in dst_release. This requires updating to a fixed kernel version or backporting the patch if using long-term support (LTS) kernels. System administrators should audit their Linux environments to identify if CONFIG_DST_CACHE is enabled and if Open vSwitch or similar tunneling technologies are in use. Where possible, temporarily disabling CONFIG_DST_CACHE or avoiding the use of affected tunneling features can reduce exposure until patches are applied. Monitoring kernel logs for paging faults or dst_release-related errors can help detect exploitation attempts or crashes. Implementing robust kernel crash dump and analysis procedures will aid in rapid diagnosis. Network segmentation and limiting access to management interfaces can reduce the risk of exploitation. Finally, organizations should coordinate with Linux distribution vendors for timely security updates and verify patch deployment across all affected systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2025-22057: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: decrease cached dst counters in dst_release Upstream fix ac888d58869b ("net: do not delay dst_entries_add() in dst_release()") moved decrementing the dst count from dst_destroy to dst_release to avoid accessing already freed data in case of netns dismantle. However in case CONFIG_DST_CACHE is enabled and OvS+tunnels are used, this fix is incomplete as the same issue will be seen for cached dsts: Unable to handle kernel paging request at virtual address ffff5aabf6b5c000 Call trace: percpu_counter_add_batch+0x3c/0x160 (P) dst_release+0xec/0x108 dst_cache_destroy+0x68/0xd8 dst_destroy+0x13c/0x168 dst_destroy_rcu+0x1c/0xb0 rcu_do_batch+0x18c/0x7d0 rcu_core+0x174/0x378 rcu_core_si+0x18/0x30 Fix this by invalidating the cache, and thus decrementing cached dst counters, in dst_release too.
AI-Powered Analysis
Technical Analysis
CVE-2025-22057 is a vulnerability in the Linux kernel related to the handling of destination cache (dst_cache) counters within the networking subsystem. The issue arises from an incomplete fix in the kernel's network stack, specifically in the functions managing cached destination entries (dst entries) used for routing and tunneling, including Open vSwitch (OvS) tunnels. The original fix moved the decrementing of dst counters from the dst_destroy function to dst_release to prevent use-after-free errors during network namespace dismantling. However, when CONFIG_DST_CACHE is enabled and OvS tunnels are in use, cached dst entries are not properly invalidated, leading to attempts to access already freed memory. This results in kernel paging faults and potential system crashes, as evidenced by the kernel call trace involving percpu_counter_add_batch and dst_release functions. The vulnerability is rooted in improper reference counting and cache invalidation of dst entries, which can cause kernel memory corruption and instability. The fix involves ensuring that cached dst counters are decremented and the cache invalidated within dst_release, preventing access to freed memory. This vulnerability affects Linux kernel versions identified by the commit hash d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8 and likely other versions with similar code paths and configurations. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with CONFIG_DST_CACHE enabled and utilizing Open vSwitch tunnels or similar networking configurations. Such environments are common in data centers, cloud infrastructure, and enterprise networks that rely on Linux-based virtualization and container orchestration platforms. The impact includes potential kernel panics or system crashes due to memory access violations, leading to denial of service (DoS) conditions. This can disrupt critical services, degrade network performance, and cause downtime. While there is no indication of direct remote code execution or privilege escalation, the instability can be exploited by attackers to cause persistent outages or to facilitate further attacks by destabilizing network infrastructure. Organizations with high availability requirements, such as financial institutions, telecommunications providers, and public sector entities, may face operational and reputational damage. Additionally, the complexity of the vulnerability in kernel networking code means that debugging and recovery might require specialized expertise, increasing incident response costs.
Mitigation Recommendations
European organizations should prioritize applying the upstream Linux kernel patch that properly invalidates cached dst entries and decrements their counters in dst_release. This requires updating to a fixed kernel version or backporting the patch if using long-term support (LTS) kernels. System administrators should audit their Linux environments to identify if CONFIG_DST_CACHE is enabled and if Open vSwitch or similar tunneling technologies are in use. Where possible, temporarily disabling CONFIG_DST_CACHE or avoiding the use of affected tunneling features can reduce exposure until patches are applied. Monitoring kernel logs for paging faults or dst_release-related errors can help detect exploitation attempts or crashes. Implementing robust kernel crash dump and analysis procedures will aid in rapid diagnosis. Network segmentation and limiting access to management interfaces can reduce the risk of exploitation. Finally, organizations should coordinate with Linux distribution vendors for timely security updates and verify patch deployment across all affected systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.812Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9831c4522896dcbe7f63
Added to database: 5/21/2025, 9:09:05 AM
Last enriched: 7/3/2025, 8:41:13 PM
Last updated: 10/16/2025, 3:14:42 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61543: n/a
HighCVE-2025-61541: n/a
HighCVE-2025-61536: n/a
HighCVE-2025-41254: CWE-352: Cross-Site Request Forgery (CSRF) in VMware Spring Framework
MediumCVE-2025-36002: Password in Configuration File in IBM Sterling B2B Integrator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.