CVE-2025-22089
📋 TL;DR
A Linux kernel vulnerability in the RDMA subsystem allows exposure of hardware counters to non-initial network namespaces, leading to a kernel NULL pointer dereference and system crash when accessed. This affects systems using RDMA (Remote Direct Memory Access) with network namespaces, primarily Linux servers with InfiniBand or RDMA-capable hardware.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially disrupting critical services.
Likely Case
Local denial of service through kernel crash when accessing specific sysfs paths in non-init network namespaces.
If Mitigated
No impact if network namespaces are not used or access to sysfs is restricted.
🎯 Exploit Status
Exploit requires local access and ability to create/use network namespaces. Proof-of-concept commands are provided in the CVE description.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check kernel stable commits: 0cf80f924aec, 6682da5d8fd5, 9a5b7f8842a9, a1ecb30f9085, c14d9704f5d7
Vendor Advisory: https://git.kernel.org/stable/c/0cf80f924aecb5b2bebd4f4ad11b2efc676a0b78
Restart Required: Yes
Instructions:
1. Update Linux kernel to a patched version from your distribution. 2. Reboot the system to load the new kernel.
🔧 Temporary Workarounds
Restrict sysfs access
linuxLimit access to /sys/class/infiniband/ directories to prevent users from triggering the vulnerability.
chmod 700 /sys/class/infiniband/
setfacl -m u:root:rwx /sys/class/infiniband/
Disable network namespaces
linuxPrevent creation of new network namespaces if not required.
sysctl -w kernel.unprivileged_userns_clone=0
🧯 If You Can't Patch
- Monitor for crash logs related to hw_stat_device_show or NULL pointer dereferences in RDMA.
- Restrict user access to systems with RDMA hardware and network namespace capabilities.
🔍 How to Verify
Check if Vulnerable:
Run: ip netns add test && ip netns exec test cat /sys/class/infiniband/*/hw_counters/* 2>&1 | grep -i 'null\|crash\|bug'
Check Version:
uname -r
Verify Fix Applied:
After patching, repeat the vulnerable command; it should return 'No such file or directory' errors instead of crashing.
📡 Detection & Monitoring
Log Indicators:
- Kernel logs with 'BUG: kernel NULL pointer dereference' referencing hw_stat_device_show or ib_core
- System crashes or panics after accessing /sys/class/infiniband/
SIEM Query:
source="kernel" AND ("NULL pointer dereference" OR "hw_stat_device_show" OR "ib_core")
🔗 References
- https://git.kernel.org/stable/c/0cf80f924aecb5b2bebd4f4ad11b2efc676a0b78
- https://git.kernel.org/stable/c/6682da5d8fd578a5068531d01633c9d2e4c8f12b
- https://git.kernel.org/stable/c/9a5b7f8842a90a5e6eeff37f9f6d814e61ea3529
- https://git.kernel.org/stable/c/a1ecb30f90856b0be4168ad51b8875148e285c1f
- https://git.kernel.org/stable/c/c14d9704f5d77a7c7fa46e2114b64a4f75b64e17
- https://git.kernel.org/stable/c/d5212b99649c5740154f307e9e3d7fee9bf62773
- https://git.kernel.org/stable/c/df45ae2a4f1cdfda00c032839e12092e1f32c05e
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html