CVE-2025-22109

5.5 MEDIUM

📋 TL;DR

This CVE describes a memory leak and refcount leak vulnerability in the Linux kernel's AX.25 protocol implementation when using the autobind feature. The vulnerability allows attackers to cause kernel memory exhaustion or trigger kernel warnings, potentially leading to denial of service. It affects Linux systems using AX.25 networking, primarily amateur radio applications.

💻 Affected Systems

Products:
  • Linux kernel
Versions: All versions before the fix commits (specific versions depend on distribution backports)
Operating Systems: Linux distributions with AX.25 support enabled
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if AX.25 protocol support is compiled into the kernel and the autobind feature is used. Most standard distributions don't enable AX.25 by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory exhaustion leading to system instability or crash, potentially enabling denial of service attacks against affected systems.

🟠

Likely Case

Memory leaks causing gradual performance degradation and kernel warning messages in system logs, with possible system instability over time.

🟢

If Mitigated

Minimal impact if AX.25 protocol is not used or autobind feature is avoided; systems would operate normally without exploitation.

🌐 Internet-Facing: LOW - AX.25 is primarily used for amateur radio and local networking, not typically exposed to the internet.
🏢 Internal Only: MEDIUM - Systems using AX.25 for internal amateur radio or specialized networking could be affected by local attackers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access or ability to trigger AX.25 socket operations. Found by fuzzing with Syzkaller.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits 2f6efbabceb6b2914ee9bafb86d9a51feae9cce8 and 61203fdd3e35519db9a98b6ff8983c620ffc4696

Vendor Advisory: https://git.kernel.org/stable/c/2f6efbabceb6b2914ee9bafb86d9a51feae9cce8

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check your distribution's security advisories for backported patches. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable AX.25 module

linux

Remove or blacklist AX.25 kernel module if not needed

echo 'blacklist ax25' >> /etc/modprobe.d/blacklist.conf
rmmod ax25

Avoid autobind usage

linux

Ensure applications don't use AX.25 socket autobind feature

🧯 If You Can't Patch

  • Disable AX.25 protocol support in kernel configuration if not required
  • Monitor system logs for refcount warnings and memory leak indicators

🔍 How to Verify

Check if Vulnerable:

Check if AX.25 module is loaded: lsmod | grep ax25. If loaded and kernel version is before fix commits, system may be vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Check kernel version includes fix commits: uname -r and verify with distribution's security advisory. Confirm AX.25 module loads without issues.

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs showing 'refcount_t: decrement hit 0; leaking memory'
  • 'ax25_connect(): uses autobind' messages
  • kmemleak reports for AX.25 objects

Network Indicators:

  • Unusual AX.25 socket creation patterns
  • Multiple failed AX.25 connection attempts

SIEM Query:

source="kernel" AND ("refcount_t" OR "ax25_connect" OR "autobind")

🔗 References

📤 Share & Export