Skip to main content

CVE-2025-22057: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-22057cvecve-2025-22057
Published: Wed Apr 16 2025 (04/16/2025, 14:12:14 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: decrease cached dst counters in dst_release Upstream fix ac888d58869b ("net: do not delay dst_entries_add() in dst_release()") moved decrementing the dst count from dst_destroy to dst_release to avoid accessing already freed data in case of netns dismantle. However in case CONFIG_DST_CACHE is enabled and OvS+tunnels are used, this fix is incomplete as the same issue will be seen for cached dsts: Unable to handle kernel paging request at virtual address ffff5aabf6b5c000 Call trace: percpu_counter_add_batch+0x3c/0x160 (P) dst_release+0xec/0x108 dst_cache_destroy+0x68/0xd8 dst_destroy+0x13c/0x168 dst_destroy_rcu+0x1c/0xb0 rcu_do_batch+0x18c/0x7d0 rcu_core+0x174/0x378 rcu_core_si+0x18/0x30 Fix this by invalidating the cache, and thus decrementing cached dst counters, in dst_release too.

AI-Powered Analysis

AILast updated: 07/03/2025, 20:41:13 UTC

Technical Analysis

CVE-2025-22057 is a vulnerability in the Linux kernel related to the handling of destination cache (dst_cache) counters within the networking subsystem. The issue arises from an incomplete fix in the kernel's network stack, specifically in the functions managing cached destination entries (dst entries) used for routing and tunneling, including Open vSwitch (OvS) tunnels. The original fix moved the decrementing of dst counters from the dst_destroy function to dst_release to prevent use-after-free errors during network namespace dismantling. However, when CONFIG_DST_CACHE is enabled and OvS tunnels are in use, cached dst entries are not properly invalidated, leading to attempts to access already freed memory. This results in kernel paging faults and potential system crashes, as evidenced by the kernel call trace involving percpu_counter_add_batch and dst_release functions. The vulnerability is rooted in improper reference counting and cache invalidation of dst entries, which can cause kernel memory corruption and instability. The fix involves ensuring that cached dst counters are decremented and the cache invalidated within dst_release, preventing access to freed memory. This vulnerability affects Linux kernel versions identified by the commit hash d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8 and likely other versions with similar code paths and configurations. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with CONFIG_DST_CACHE enabled and utilizing Open vSwitch tunnels or similar networking configurations. Such environments are common in data centers, cloud infrastructure, and enterprise networks that rely on Linux-based virtualization and container orchestration platforms. The impact includes potential kernel panics or system crashes due to memory access violations, leading to denial of service (DoS) conditions. This can disrupt critical services, degrade network performance, and cause downtime. While there is no indication of direct remote code execution or privilege escalation, the instability can be exploited by attackers to cause persistent outages or to facilitate further attacks by destabilizing network infrastructure. Organizations with high availability requirements, such as financial institutions, telecommunications providers, and public sector entities, may face operational and reputational damage. Additionally, the complexity of the vulnerability in kernel networking code means that debugging and recovery might require specialized expertise, increasing incident response costs.

Mitigation Recommendations

European organizations should prioritize applying the upstream Linux kernel patch that properly invalidates cached dst entries and decrements their counters in dst_release. This requires updating to a fixed kernel version or backporting the patch if using long-term support (LTS) kernels. System administrators should audit their Linux environments to identify if CONFIG_DST_CACHE is enabled and if Open vSwitch or similar tunneling technologies are in use. Where possible, temporarily disabling CONFIG_DST_CACHE or avoiding the use of affected tunneling features can reduce exposure until patches are applied. Monitoring kernel logs for paging faults or dst_release-related errors can help detect exploitation attempts or crashes. Implementing robust kernel crash dump and analysis procedures will aid in rapid diagnosis. Network segmentation and limiting access to management interfaces can reduce the risk of exploitation. Finally, organizations should coordinate with Linux distribution vendors for timely security updates and verify patch deployment across all affected systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.812Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9831c4522896dcbe7f63

Added to database: 5/21/2025, 9:09:05 AM

Last enriched: 7/3/2025, 8:41:13 PM

Last updated: 8/12/2025, 5:38:40 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats