CVE-2025-38577
📋 TL;DR
A use-after-free vulnerability in the Linux kernel's F2FS filesystem can cause kernel panic when evicting inodes. This affects systems using F2FS filesystem and could lead to denial of service or potential privilege escalation. The vulnerability is triggered during filesystem operations like unmounting or inode cleanup.
💻 Affected Systems
- Linux kernel with F2FS support
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, potential privilege escalation if combined with other vulnerabilities, or data corruption on F2FS filesystems.
Likely Case
System crash or kernel panic when performing filesystem operations on F2FS, resulting in denial of service.
If Mitigated
Minor performance impact during filesystem operations with proper kernel hardening and isolation.
🎯 Exploit Status
Requires local access and ability to trigger specific F2FS operations. The vulnerability was discovered through syzkaller fuzzing.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel with commits: 15df59809c54fbd687cdf27efbd2103a937459be, 42f9ea16aea8b49febaa87950a006a1792209f38, 4732ca17c17f5062426cfa982f43593e6b81963b, 5cd99d5aa3d39086bdb53eb5c52df16e98b101a0, 880ef748e78a1eb7df2d8e11a9ef21e98bcaabe5
Vendor Advisory: https://git.kernel.org/stable/c/15df59809c54fbd687cdf27efbd2103a937459be
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable F2FS filesystem
allAvoid using F2FS filesystem until patched
# Check if F2FS is in use: mount | grep f2fs
# If found, consider migrating to ext4 or other filesystems
Restrict user access to F2FS mounts
allLimit which users can access F2FS filesystems
# Use mount options: mount -o nosuid,nodev,noexec /dev/sdX /mnt/f2fs
# Set appropriate permissions on mount points
🧯 If You Can't Patch
- Implement strict access controls on F2FS filesystems
- Monitor system logs for kernel panic or F2FS-related errors
- Consider migrating critical data off F2FS filesystems
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if F2FS is in use: uname -r && mount | grep f2fs
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commits: grep -r '15df59809c54fbd687cdf27efbd2103a937459be' /usr/src/linux/
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- KASAN use-after-free reports
- F2FS error messages in dmesg
- System crash/reboot logs
Network Indicators:
- None - local vulnerability
SIEM Query:
source="kernel" AND ("KASAN: use-after-free" OR "f2fs_evict_inode" OR "panic" OR "BUG:")
🔗 References
- https://git.kernel.org/stable/c/15df59809c54fbd687cdf27efbd2103a937459be
- https://git.kernel.org/stable/c/42f9ea16aea8b49febaa87950a006a1792209f38
- https://git.kernel.org/stable/c/4732ca17c17f5062426cfa982f43593e6b81963b
- https://git.kernel.org/stable/c/5cd99d5aa3d39086bdb53eb5c52df16e98b101a0
- https://git.kernel.org/stable/c/880ef748e78a1eb7df2d8e11a9ef21e98bcaabe5
- https://git.kernel.org/stable/c/9535e440fe5bc6c5ac7cfb407e53bf788b8bf8d4
- https://git.kernel.org/stable/c/97df495d754116c8c28ac6a4112f831727bde887
- https://git.kernel.org/stable/c/9bbfe83924946552c4c513099c0e8c83af76311a
- https://git.kernel.org/stable/c/a509a55f8eecc8970b3980c6f06886bbff0e2f68
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html