CVE-2025-37908

7.8 HIGH

📋 TL;DR

A Linux kernel memory management vulnerability where slab object extensions aren't properly cleaned up when memory allocation profiling is disabled. This can cause memory corruption and system crashes. Affects Linux systems with specific kernel configurations.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Specific affected versions not specified in CVE, but patches exist in stable branches
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when memory allocation profiling is enabled and then disabled at runtime, or when profiling encounters errors.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, denial of service, or potential privilege escalation if combined with other vulnerabilities.

🟠

Likely Case

System instability, crashes, or performance degradation due to memory corruption.

🟢

If Mitigated

Minimal impact if systems aren't using memory allocation profiling or have proper monitoring.

🌐 Internet-Facing: LOW - Requires local access or existing system compromise to trigger.
🏢 Internal Only: MEDIUM - Could be exploited by malicious local users or cause system instability affecting services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Requires specific kernel configuration and triggering conditions. Likely requires local access to system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel branches (commits: 01db0e1a48345aa1937f3bdfc7c7108d03ebcf7e, be8250786ca94952a19ce87f98ad9906448bc9ef, dab2a13059a475b6392550f882276e170fe2fcff)

Vendor Advisory: https://git.kernel.org/stable/c/01db0e1a48345aa1937f3bdfc7c7108d03ebcf7e

Restart Required: Yes

Instructions:

1. Update to patched kernel version from your distribution's repository. 2. Rebuild kernel if using custom kernel. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable memory allocation profiling

linux

Prevent the vulnerability by ensuring memory allocation profiling is not enabled or disabled at runtime

echo 0 > /sys/kernel/debug/mem_profiling/enable

🧯 If You Can't Patch

  • Avoid enabling/disabling memory allocation profiling at runtime
  • Monitor system logs for memory corruption warnings and crashes

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if memory allocation profiling is enabled: cat /proc/version && cat /sys/kernel/debug/mem_profiling/enable

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and check system logs for absence of memory corruption errors

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • 'Bad page state' errors in dmesg
  • Memory corruption warnings
  • Cgroup charging errors

Network Indicators:

  • None - local vulnerability

SIEM Query:

source="kernel" AND ("Bad page state" OR "page still charged to cgroup" OR memory_corruption)

🔗 References

📤 Share & Export