CVE-2025-22024

5.5 MEDIUM

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's NFS server (nfsd) allows a root user to trigger a kernel panic or system crash by manipulating listener transports when no active threads are running. This affects Linux systems running NFS server with kernel versions containing the bug. The vulnerability requires root access to exploit.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions containing the bug up to the fix (specific versions not provided, but appears to be around 6.13.0-rc6)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems running NFS server (nfsd) with root users able to execute nfsdctl commands.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data loss or service disruption.

🟠

Likely Case

System crash requiring reboot, causing temporary NFS service unavailability.

🟢

If Mitigated

No impact if proper access controls prevent unauthorized root access to nfsdctl commands.

🌐 Internet-Facing: LOW - Requires root access and NFS server exposure is typically limited to internal networks.
🏢 Internal Only: MEDIUM - Root users on affected systems can crash the kernel, but requires privileged access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires root access and specific sequence of nfsdctl commands when no active threads are running.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits 052a34f093fb940a145493d1438e7abbfe507cdd, 0f42df0ab2b11ea6b2884bdaf6dbc3be6dde7e82, a84c80515ca8a0cdf6d06f1b6ca721224b08453e, or d093c90892607be505e801469d6674459e69ab89

Vendor Advisory: https://git.kernel.org/stable/c/052a34f093fb940a145493d1438e7abbfe507cdd

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Reboot system. 3. Verify kernel version with 'uname -r'.

🔧 Temporary Workarounds

Restrict nfsdctl access

linux

Limit root access to nfsdctl commands using sudo restrictions or access controls.

sudo visudo
Add: 'username ALL=(ALL) !/usr/sbin/nfsdctl'

Disable NFS server if unused

linux

Stop and disable nfsd service if not required.

sudo systemctl stop nfs-server
sudo systemctl disable nfs-server

🧯 If You Can't Patch

  • Restrict root access to nfsdctl commands using sudoers or RBAC
  • Monitor for kernel panic logs and unauthorized nfsdctl usage

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if nfsd is running: 'uname -r' and 'systemctl status nfs-server'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and test nfsdctl listener removal doesn't cause crashes

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs with refcount_warn_saturate messages
  • nfsdctl command usage in audit logs

Network Indicators:

  • Sudden NFS service interruption

SIEM Query:

source="kernel" AND "refcount_warn_saturate" OR "use-after-free"

🔗 References

📤 Share & Export