CVE-2025-21809

5.5 MEDIUM

📋 TL;DR

This CVE describes a potential deadlock vulnerability in the Linux kernel's rxrpc and afs subsystems. The issue occurs when RCU cleanup in BH context attempts to acquire a spinlock that may already be held in non-BH context, potentially causing system hangs. This affects Linux systems using the AFS filesystem or rxrpc protocol.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions up to 6.13.0-rc5 (specifically mentioned in report), likely affects earlier versions with similar code.
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if AFS filesystem or rxrpc protocol is in use. Many systems may not have these enabled by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

System deadlock leading to kernel panic, denial of service, or system instability requiring reboot.

🟠

Likely Case

System hangs or performance degradation when AFS filesystem operations or rxrpc protocol operations are active.

🟢

If Mitigated

Minor performance impact from lock contention, but no deadlock.

🌐 Internet-Facing: LOW - This is a kernel-level issue not directly exposed to network attacks.
🏢 Internal Only: MEDIUM - Systems using AFS or rxrpc could experience service disruption.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

This is a race condition requiring specific timing and system configuration. Exploitation would likely cause denial of service rather than privilege escalation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 0e77dd41689637ac4e1b8fe0f27541f373640855, 10ba5a3d57af20e494e0d979d1894260989235dd, 79d458c13056559d49b5e41fbc4b6890e68cf65b

Vendor Advisory: https://git.kernel.org/stable/c/0e77dd41689637ac4e1b8fe0f27541f373640855

Restart Required: Yes

Instructions:

1. Update to a kernel version containing the fix commits. 2. Check with your Linux distribution for backported patches. 3. Reboot the system after kernel update.

🔧 Temporary Workarounds

Disable AFS and rxrpc

linux

If not needed, disable AFS filesystem support and rxrpc protocol to eliminate vulnerability surface.

modprobe -r kafs
modprobe -r rxrpc
echo 'blacklist kafs' >> /etc/modprobe.d/blacklist.conf
echo 'blacklist rxrpc' >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Monitor system for lock contention warnings in kernel logs
  • Consider migrating AFS workloads to alternative filesystems if possible

🔍 How to Verify

Check if Vulnerable:

Check kernel version with 'uname -r' and compare to affected versions. Check if AFS or rxrpc modules are loaded with 'lsmod | grep -E "(kafs|rxrpc)"'.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or is newer than 6.13.0-rc5. Check that lockdep warnings no longer appear in dmesg.

📡 Detection & Monitoring

Log Indicators:

  • Kernel lockdep warnings mentioning rxrpc_put_peer, peer_hash_lock, or RCU callback deadlock
  • System hangs or high CPU usage in kernel threads

Network Indicators:

  • Unusual AFS protocol errors or timeouts

SIEM Query:

source="kernel" AND ("lockdep" OR "deadlock" OR "rxrpc" OR "peer_hash_lock")

🔗 References

📤 Share & Export