CVE-2025-22083

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's vhost-scsi subsystem allows attackers to cause denial of service, system crashes, or potentially execute arbitrary code. This affects systems using vhost-scsi for virtualized SCSI storage, particularly those where vhost_scsi_set_endpoint is called multiple times without proper cleanup. The vulnerability is exploitable by users with access to vhost-scsi interfaces, typically virtual machine guests or privileged users.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when vhost-scsi is in use and vhost_scsi_set_endpoint is called multiple times without vhost_scsi_clear_endpoint between calls. QEMU already prevents this pattern.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, potential privilege escalation to kernel mode, or arbitrary code execution in kernel context.

🟠

Likely Case

System instability, kernel crashes, denial of service to virtual machines using vhost-scsi storage, or inability to manage storage targets.

🟢

If Mitigated

Limited impact if proper access controls prevent unauthorized users from calling vhost_scsi_set_endpoint multiple times.

🌐 Internet-Facing: LOW - This requires access to vhost-scsi interfaces which are typically not exposed to the internet.
🏢 Internal Only: MEDIUM - Exploitable by virtual machine guests or users with access to vhost-scsi interfaces within the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to call vhost_scsi_set_endpoint multiple times, which is prevented by major users like QEMU. The vulnerability was discovered through code analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 2b34bdc42df047794542f3e220fe989124e4499a, 3a19eb3d9818e28f14c818a18dc913344a52ca92, 3fd054baf382a426bbf5135ede0fc5673db74d3e, 451c72f5e7cf5d339a6410a635cee0825687c3dc, 5dd639a1646ef5fe8f4bf270fad47c5c3755b9b6

Vendor Advisory: https://git.kernel.org/stable/c/2b34bdc42df047794542f3e220fe989124e4499a

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check your distribution's security advisories for specific patched versions. 3. Reboot the system after kernel update.

🔧 Temporary Workarounds

Prevent multiple vhost_scsi_set_endpoint calls

linux

Ensure applications using vhost-scsi (like QEMU) follow proper sequence: vhost_scsi_clear_endpoint must be called between vhost_scsi_set_endpoint calls.

Disable vhost-scsi if not needed

linux

Remove or disable vhost-scsi module if not required for your virtualization setup.

modprobe -r vhost_scsi

🧯 If You Can't Patch

  • Ensure QEMU or other vhost-scsi users are updated to versions that prevent multiple vhost_scsi_set_endpoint calls
  • Restrict access to vhost-scsi interfaces to trusted users only

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if vhost_scsi module is loaded: lsmod | grep vhost_scsi && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits or check with your distribution's security advisory

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • System crash dumps
  • vhost-scsi error messages in dmesg

SIEM Query:

Search for kernel panic events or vhost-scsi related crashes in system logs

🔗 References

📤 Share & Export