CVE-2025-22018

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's ATM subsystem allows local attackers to cause a kernel panic (denial of service) by triggering specific conditions in MPOA_cache_impos_rcvd(). This affects systems with ATM networking enabled, primarily Linux servers and embedded devices using ATM functionality.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions up to and including 6.14.0-rc2 (specific affected versions not fully documented, but includes versions before the fix commits)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if ATM (Asynchronous Transfer Mode) networking is enabled and configured. Most modern systems do not use ATM by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical or remote console access to reboot.

🟠

Likely Case

Local denial of service through kernel panic, requiring system reboot to restore functionality.

🟢

If Mitigated

Minimal impact if ATM functionality is disabled or unused, as the vulnerable code path requires ATM to be active.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the system; not directly exploitable over the internet.
🏢 Internal Only: MEDIUM - Local users or processes could trigger the vulnerability, but requires ATM functionality to be enabled which is uncommon in modern deployments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM - Requires local access and ability to trigger specific ATM message handling conditions

Exploitation requires sending specific messages to the ATM subsystem, which typically requires local system access and ATM configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 09691f367df44fe93255274d80a439f9bb3263fc, 0ef6e49881b6b50ac454cb9d6501d009fdceb6fc, 14c7aca5ba2740973de27c1bb8df77b4dcb6f775, 1505f9b720656b17865e4166ab002960162bf679, 3c23bb2c894e9ef2727682f98c341b20f78c9013

Vendor Advisory: https://git.kernel.org/stable/c/09691f367df44fe93255274d80a439f9bb3263fc

Restart Required: Yes

Instructions:

1. Update to a kernel version containing the fix commits. 2. Check your distribution's security advisories for patched kernel packages. 3. Reboot the system after kernel update.

🔧 Temporary Workarounds

Disable ATM functionality

linux

Remove or disable ATM kernel modules if not needed

modprobe -r atm
echo 'blacklist atm' >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Disable ATM kernel modules if not required for system functionality
  • Restrict local user access to systems where ATM is enabled

🔍 How to Verify

Check if Vulnerable:

Check if ATM modules are loaded: lsmod | grep atm. If loaded and kernel version is before fixes, system may be vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Check kernel version includes fix commits: uname -r and verify with distribution security advisories.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages mentioning 'general protection fault' or 'null-ptr-deref' in ATM-related functions
  • KASAN reports with 'null-ptr-deref' in MPOA_cache_impos_rcvd or eg_cache_remove_entry

Network Indicators:

  • Unusual ATM protocol traffic from local processes

SIEM Query:

source="kernel" AND ("general protection fault" OR "null-ptr-deref") AND ("atm" OR "MPOA" OR "eg_cache")

🔗 References

📤 Share & Export