Skip to main content

CVE-2025-22062: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-22062cvecve-2025-22062
Published: Wed Apr 16 2025 (04/16/2025, 14:12:17 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: sctp: add mutual exclusion in proc_sctp_do_udp_port() We must serialize calls to sctp_udp_sock_stop() and sctp_udp_sock_start() or risk a crash as syzbot reported: Oops: general protection fault, probably for non-canonical address 0xdffffc000000000d: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000068-0x000000000000006f] CPU: 1 UID: 0 PID: 6551 Comm: syz.1.44 Not tainted 6.14.0-syzkaller-g7f2ff7b62617 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 RIP: 0010:kernel_sock_shutdown+0x47/0x70 net/socket.c:3653 Call Trace: <TASK> udp_tunnel_sock_release+0x68/0x80 net/ipv4/udp_tunnel_core.c:181 sctp_udp_sock_stop+0x71/0x160 net/sctp/protocol.c:930 proc_sctp_do_udp_port+0x264/0x450 net/sctp/sysctl.c:553 proc_sys_call_handler+0x3d0/0x5b0 fs/proc/proc_sysctl.c:601 iter_file_splice_write+0x91c/0x1150 fs/splice.c:738 do_splice_from fs/splice.c:935 [inline] direct_splice_actor+0x18f/0x6c0 fs/splice.c:1158 splice_direct_to_actor+0x342/0xa30 fs/splice.c:1102 do_splice_direct_actor fs/splice.c:1201 [inline] do_splice_direct+0x174/0x240 fs/splice.c:1227 do_sendfile+0xafd/0xe50 fs/read_write.c:1368 __do_sys_sendfile64 fs/read_write.c:1429 [inline] __se_sys_sendfile64 fs/read_write.c:1415 [inline] __x64_sys_sendfile64+0x1d8/0x220 fs/read_write.c:1415 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]

AI-Powered Analysis

AILast updated: 07/03/2025, 20:42:18 UTC

Technical Analysis

CVE-2025-22062 is a vulnerability identified in the Linux kernel's SCTP (Stream Control Transmission Protocol) implementation, specifically within the function proc_sctp_do_udp_port(). The root cause is a lack of proper mutual exclusion (serialization) between calls to sctp_udp_sock_stop() and sctp_udp_sock_start(). This race condition can lead to a kernel crash, as demonstrated by a general protection fault triggered by a null pointer dereference in kernel_sock_shutdown(), which is part of the socket shutdown process. The vulnerability was discovered through syzbot fuzzing, which reported a kernel panic involving a non-canonical address and KASAN (Kernel Address Sanitizer) null pointer dereference. The issue arises because concurrent execution of these functions without proper locking can cause use-after-free or null pointer dereference scenarios, leading to system instability or denial of service (DoS). The vulnerability affects Linux kernel versions identified by the commit hash 046c052b475e7119b6a30e3483e2888fc606a2f8 and likely other versions in the 6.14 kernel series or similar. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The fix involves adding mutual exclusion to serialize the calls to sctp_udp_sock_stop() and sctp_udp_sock_start(), preventing concurrent access and eliminating the race condition. This vulnerability is significant because SCTP is used in specialized networking scenarios, including telecommunications and certain enterprise applications, and a kernel crash can lead to system downtime or potential disruption of network services.

Potential Impact

For European organizations, the impact of CVE-2025-22062 can be considerable, especially for those relying on Linux-based infrastructure that utilizes SCTP for critical communications. Telecommunications providers, financial institutions, and government agencies that use SCTP for signaling or data transport may experience service interruptions due to kernel crashes triggered by this vulnerability. The denial of service caused by a kernel panic could disrupt network availability, impacting business continuity and potentially causing cascading failures in dependent systems. Additionally, while no remote code execution is indicated, the ability to cause a kernel crash remotely or locally could be exploited by attackers to degrade service or perform targeted attacks against critical infrastructure. The lack of authentication or user interaction requirements increases the risk, as automated or unauthenticated processes might trigger the vulnerability. Given the widespread use of Linux in servers and network appliances across Europe, the vulnerability poses a risk to operational stability and could have regulatory implications under frameworks like NIS2, which mandates cybersecurity resilience for essential services.

Mitigation Recommendations

To mitigate CVE-2025-22062, European organizations should prioritize the following actions: 1) Apply the official Linux kernel patches that introduce mutual exclusion in proc_sctp_do_udp_port() as soon as they are released and tested. 2) For environments where immediate patching is not feasible, consider disabling SCTP support temporarily if it is not critical to operations, using kernel configuration options or module blacklisting. 3) Implement strict access controls and network segmentation to limit exposure of systems running vulnerable Linux kernels, especially those handling SCTP traffic. 4) Monitor kernel logs and system stability metrics for signs of crashes or anomalies related to SCTP socket operations. 5) Employ proactive fuzz testing and kernel integrity monitoring to detect attempts to exploit this or similar vulnerabilities. 6) Coordinate with Linux distribution vendors and infrastructure providers to ensure timely updates and vulnerability management. 7) Review and update incident response plans to include scenarios involving kernel-level denial of service events. These steps go beyond generic advice by focusing on SCTP-specific controls, operational monitoring, and patch management tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.813Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9831c4522896dcbe7fa8

Added to database: 5/21/2025, 9:09:05 AM

Last enriched: 7/3/2025, 8:42:18 PM

Last updated: 8/18/2025, 9:00:18 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats