CVE-2025-22056

7.8 HIGH

📋 TL;DR

A heap out-of-bounds write vulnerability in the Linux kernel's netfilter nft_tunnel module allows attackers to corrupt kernel memory when processing malicious GENEVE tunnel options. This affects Linux systems using nftables with tunnel rules. Exploitation could lead to kernel crashes or potential privilege escalation.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with the vulnerable nft_tunnel code (specific versions not provided in CVE, but references indicate fixes in stable branches)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if nftables is configured with tunnel rules using GENEVE options. Systems not using nftables or tunnel functionality are not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic, system crash, or privilege escalation to root via kernel memory corruption leading to arbitrary code execution.

🟠

Likely Case

Kernel panic or system crash causing denial of service, potentially leading to privilege escalation in sophisticated attacks.

🟢

If Mitigated

Limited to denial of service if exploit attempts are blocked by security controls or if the vulnerable functionality isn't used.

🌐 Internet-Facing: MEDIUM - Requires nftables configuration with tunnel rules and network access to trigger the vulnerability.
🏢 Internal Only: MEDIUM - Internal attackers with network access to affected systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

The CVE includes kernel panic output from a proof-of-concept, indicating exploit code exists. Exploitation requires ability to send specially crafted nftables configuration to the kernel.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with fixes from the provided git commits (0a93a710d6df334b828ea064c6d39fda34f901dc and others)

Vendor Advisory: https://git.kernel.org/stable/c/0a93a710d6df334b828ea064c6d39fda34f901dc

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. Check your distribution's security advisories for specific patched kernel versions. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable nft_tunnel module

linux

Prevent loading of the vulnerable nft_tunnel kernel module

echo 'blacklist nft_tunnel' >> /etc/modprobe.d/blacklist-nft-tunnel.conf
rmmod nft_tunnel

Disable nftables tunnel functionality

linux

Remove or disable nftables rules using tunnel features

nft delete rule inet filter forward
nft flush ruleset

🧯 If You Can't Patch

  • Restrict network access to systems using nftables tunnel rules
  • Implement strict network segmentation to limit who can send nftables configuration

🔍 How to Verify

Check if Vulnerable:

Check if nft_tunnel module is loaded: lsmod | grep nft_tunnel. If loaded and kernel version is unpatched, system is vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Check kernel version against patched versions from distribution advisories and verify nft_tunnel module functions without crashes.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages mentioning nft_tunnel_obj_init
  • KASAN reports of slab-out-of-bounds writes
  • System crashes when configuring nftables tunnel rules

Network Indicators:

  • Unusual nftables configuration traffic
  • Network packets attempting to trigger GENEVE option parsing

SIEM Query:

event_source="kernel" AND (message CONTAINS "nft_tunnel" OR message CONTAINS "KASAN: slab-out-of-bounds")

🔗 References

📤 Share & Export