CVE-2025-38068

7.8 HIGH

📋 TL;DR

A buffer overflow vulnerability exists in the Linux kernel's LZO compression implementation. Attackers can exploit this to write beyond allocated memory boundaries, potentially leading to system crashes or arbitrary code execution. This affects all Linux systems using the vulnerable kernel crypto/lzo module.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not specified in CVE, but all versions before the fix commit dates are vulnerable
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the crypto/lzo module; systems must use LZO compression via kernel crypto API to be affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel-level arbitrary code execution leading to full system compromise, privilege escalation, or persistent rootkits.

🟠

Likely Case

Kernel panic or system crash causing denial of service, with potential for limited code execution in controlled environments.

🟢

If Mitigated

System crash or instability if exploit attempts are blocked by kernel protections like KASLR or SMEP.

🌐 Internet-Facing: MEDIUM - Requires specific conditions where LZO compression is used on untrusted data from network sources.
🏢 Internal Only: MEDIUM - Local users or processes could trigger the vulnerability through system calls or local applications using LZO compression.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering LZO compression with malicious input; complexity depends on specific use case and kernel protections.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits: 0acdc4d6e679ba31d01e3e7e2e4124b76d6d8e2a, 167373d77c70c2b558aae3e327b115249bb2652c, 4b173bb2c4665c23f8fcf5241c7b06dfa6b5b111, 7caad075acb634a74911830d6386c50ea12566cd, a98bd864e16f91c70b2469adf013d713d04d1d13

Vendor Advisory: https://git.kernel.org/stable/c/0acdc4d6e679ba31d01e3e7e2e4124b76d6d8e2a

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable LZO compression module

linux

Prevent loading of vulnerable crypto/lzo module

echo 'blacklist lzo' >> /etc/modprobe.d/blacklist.conf
rmmod lzo

Restrict kernel module loading

linux

Prevent unauthorized module loading that could include vulnerable LZO

echo 'kernel.modules_disabled=1' >> /etc/sysctl.conf
sysctl -p

🧯 If You Can't Patch

  • Implement strict input validation for any applications using LZO compression
  • Deploy kernel hardening features like KASLR, SMEP, and SMAP to limit exploit impact

🔍 How to Verify

Check if Vulnerable:

Check if LZO module is loaded: lsmod | grep lzo AND check kernel version against patched versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated AND LZO module functions correctly with test compression/decompression

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • System crash/panic logs
  • Unexpected process termination

Network Indicators:

  • Unusual compression-related network traffic patterns

SIEM Query:

source="kernel" AND ("Oops" OR "panic" OR "general protection fault") AND process="lzo"

🔗 References

📤 Share & Export