CVE-2025-38627

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the Linux kernel's F2FS filesystem compression feature. It allows attackers to potentially crash the kernel or execute arbitrary code by exploiting a race condition during file deletion. Systems using F2FS compression are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with F2FS compression support before the fix commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when F2FS filesystem compression is enabled and in use. Many systems may not have this feature enabled by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash or potential arbitrary code execution with kernel privileges, resulting in complete system compromise.

🟠

Likely Case

Kernel crash leading to denial of service and system instability.

🟢

If Mitigated

Limited impact if F2FS compression is disabled or the system has proper access controls preventing unprivileged users from triggering the race condition.

🌐 Internet-Facing: LOW - Requires local access to trigger the race condition.
🏢 Internal Only: MEDIUM - Local users or processes could exploit this to crash the system or potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires triggering a specific race condition during file deletion while F2FS compression is active. This requires local access and precise timing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 39868685c2a94a70762bc6d77dc81d781d05bff5, 5d604d40cd3232b09cb339941ef958e49283ed0a, or 8fae5b6addd5f6895e03797b56e3c7b9f9cd15c9

Vendor Advisory: https://git.kernel.org/stable/c/39868685c2a94a70762bc6d77dc81d781d05bff5

Restart Required: Yes

Instructions:

1. Update to a kernel version containing the fix commits. 2. Check with your Linux distribution for security updates. 3. Reboot the system after kernel update.

🔧 Temporary Workarounds

Disable F2FS compression

linux

Disable F2FS compression feature to prevent exploitation

mount -o remount,no_compress /path/to/mountpoint

🧯 If You Can't Patch

  • Disable F2FS compression on all affected filesystems
  • Restrict local user access to systems using F2FS compression

🔍 How to Verify

Check if Vulnerable:

Check if F2FS compression is enabled: 'mount | grep f2fs | grep compress' and check kernel version against affected versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits: 'uname -r' and check with distribution security advisories

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • OOPs messages related to F2FS or compression
  • System crash reports

Network Indicators:

  • None - local vulnerability only

SIEM Query:

Search for kernel panic events or system crashes on hosts using F2FS filesystems

🔗 References

📤 Share & Export