CVE-2025-37785

7.1 HIGH

📋 TL;DR

A memory corruption vulnerability in the Linux kernel's ext4 filesystem allows out-of-bounds read when processing corrupted directories. Attackers with access to mount malicious filesystems could trigger kernel crashes or potentially leak sensitive kernel memory. This affects all Linux systems using ext4 filesystems.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Multiple stable kernel versions before fixes were applied (specific versions in git commits)
Operating Systems: Linux distributions using ext4 filesystem
Default Config Vulnerable: ⚠️ Yes
Notes: Only exploitable when mounting corrupted filesystems with specific directory structures. Requires ext4 filesystem usage.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, denial of service, or potential information disclosure of kernel memory contents.

🟠

Likely Case

System crash or kernel panic when processing specially crafted filesystems, leading to denial of service.

🟢

If Mitigated

No impact if systems don't mount untrusted filesystems and have proper access controls.

🌐 Internet-Facing: LOW - Requires filesystem mounting capability, typically not exposed to internet.
🏢 Internal Only: MEDIUM - Malicious insiders or compromised accounts with filesystem mounting privileges could exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Found by syzkaller fuzzer. Requires ability to mount malicious filesystem. No public exploit code known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel versions with commit hashes: 14da7dbecb430e35b5889da8dae7bef33173b351, 52a5509ab19a5d3afe301165d9b5787bba34d842, 53bc45da8d8da92ec07877f5922b130562eb4b00, 89503e5eae64637d0fa2218912b54660effe7d93, ac28c5684c1cdab650a7e5065b19e91577d37a4b

Vendor Advisory: https://git.kernel.org/stable/c/14da7dbecb430e35b5889da8dae7bef33173b351

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Restrict filesystem mounting

linux

Limit who can mount filesystems using discretionary access controls or SELinux/AppArmor policies.

chmod 700 /bin/mount
setfacl -m u:root:rwx /bin/mount

Use alternative filesystems

linux

Consider using XFS or Btrfs for untrusted filesystem sources where possible.

mkfs.xfs /dev/device
mkfs.btrfs /dev/device

🧯 If You Can't Patch

  • Implement strict access controls on mount command and filesystem devices
  • Monitor for unusual mount activity and kernel panic logs

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with patched versions. Vulnerable if using unpatched kernel with ext4 support.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes one of the fix commits: uname -r and check git log for commit hashes

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • KASAN reports of use-after-free in __ext4_check_dir_entry
  • System crashes during directory operations

Network Indicators:

  • None - local filesystem vulnerability

SIEM Query:

source="kernel" AND ("KASAN" OR "use-after-free" OR "__ext4_check_dir_entry" OR "ext4_empty_dir")

🔗 References

📤 Share & Export