CVE-2020-25672

7.5 HIGH

📋 TL;DR

CVE-2020-25672 is a memory leak vulnerability in the Linux kernel's llcp_sock_connect function. This vulnerability allows attackers to cause denial of service by exhausting system memory, affecting systems running vulnerable Linux kernel versions with NFC (Near Field Communication) support enabled.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Versions before 5.9.8
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with NFC functionality enabled and compiled into kernel or loaded as module.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or unavailability due to memory exhaustion, potentially requiring physical reboot.

🟠

Likely Case

Degraded system performance and instability leading to denial of service for affected services.

🟢

If Mitigated

Minimal impact if NFC functionality is disabled or systems are properly patched.

🌐 Internet-Facing: LOW - Requires local access or NFC proximity, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Could be exploited by malicious insiders or through compromised internal accounts with local access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger NFC socket connections. No known public exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel 5.9.8 and later

Vendor Advisory: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d4a8638814b1cbf94f4e487b4c7b8dfb6c5a3b5

Restart Required: Yes

Instructions:

1. Update Linux kernel to version 5.9.8 or later. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable NFC functionality

linux

Prevent exploitation by disabling NFC kernel module or functionality

modprobe -r nfc
echo 'blacklist nfc' >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Disable NFC functionality at kernel level if not required
  • Implement strict access controls to prevent unauthorized local access to systems

🔍 How to Verify

Check if Vulnerable:

Check kernel version: uname -r. If version is earlier than 5.9.8 and NFC is enabled, system is vulnerable.

Check Version:

uname -r

Verify Fix Applied:

After patching, verify kernel version is 5.9.8 or later with uname -r and check NFC module status with lsmod | grep nfc.

📡 Detection & Monitoring

Log Indicators:

  • Kernel oom-killer messages
  • Memory exhaustion warnings in dmesg
  • System performance degradation logs

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

source="kernel" AND ("out of memory" OR "oom-killer" OR memory_exhaustion)

🔗 References

📤 Share & Export