CVE-2025-22101

5.5 MEDIUM

📋 TL;DR

A vulnerability in the Linux kernel's libwx networking module causes Tx ring hangs when non-TCP/UDP/SCTP packets are sent with Tx checksum offload enabled. This affects systems using the libwx module for network operations, potentially causing denial of service. The vulnerability is present in Linux kernel versions before the fix.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Versions before the fix commits (specific versions depend on distribution backports)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the libwx networking module. Many distributions may not enable this module by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network interface failure leading to denial of service on affected systems, requiring system reboot to restore functionality.

🟠

Likely Case

Network performance degradation or intermittent connectivity issues when specific packet types trigger the bug.

🟢

If Mitigated

Minimal impact if systems don't use the affected libwx module or have workarounds in place.

🌐 Internet-Facing: MEDIUM - Could be triggered by crafted network traffic, but requires specific conditions and affects limited systems.
🏢 Internal Only: MEDIUM - Internal network traffic could trigger the condition, potentially affecting critical infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specific packet types to trigger the bug, but no public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 5f583e059eced1857f41e221ef5951e029e632bd, 6d56ea133adf0389b216ba6e47f7f35e95776713, c7d82913d5f9e97860772ee4051eaa66b56a6273

Vendor Advisory: https://git.kernel.org/stable/c/5f583e059eced1857f41e221ef5951e029e632bd

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable libwx module

linux

Prevent loading of the vulnerable libwx kernel module

echo 'blacklist libwx' >> /etc/modprobe.d/blacklist.conf
rmmod libwx

Disable Tx checksum offload

linux

Disable hardware checksum offload for affected interfaces

ethtool -K <interface> tx off

🧯 If You Can't Patch

  • Implement network filtering to block non-TCP/UDP/SCTP traffic to affected systems
  • Monitor systems for network interface hangs and have reboot procedures ready

🔍 How to Verify

Check if Vulnerable:

Check if libwx module is loaded: lsmod | grep libwx. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update and ensure libwx module functions without Tx ring hangs.

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs showing network interface errors
  • System logs indicating network connectivity loss

Network Indicators:

  • Sudden drop in network traffic from affected systems
  • Increased packet loss on specific interfaces

SIEM Query:

source="kernel" AND ("libwx" OR "Tx ring" OR "checksum offload")

🔗 References

📤 Share & Export