CVE-2025-38650

5.5 MEDIUM

📋 TL;DR

A race condition vulnerability in the Linux kernel's HFS+ filesystem implementation where concurrent file operations can trigger a false warning about mutex locking, potentially causing system instability or denial of service. This affects systems using the HFS+ filesystem driver, primarily Linux servers and workstations.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected kernel versions not specified in CVE, but patches available for multiple stable branches
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when HFS+ filesystem is mounted and in use. Many Linux systems don't use HFS+ by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic or system crash due to triggered warnings disrupting normal operations, leading to denial of service.

🟠

Likely Case

System logs flooded with warning messages, potential performance degradation, and false positive alerts from monitoring systems.

🟢

If Mitigated

Minor logging noise with no functional impact if warnings are handled gracefully.

🌐 Internet-Facing: LOW - Requires local filesystem access and HFS+ usage, not directly network exploitable.
🏢 Internal Only: MEDIUM - Internal users with filesystem access could trigger the condition on HFS+ volumes.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires concurrent file operations on HFS+ filesystem by multiple processes/threads. Discovered through syzbot fuzzing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel versions with commits: 0807e4ac59a5, 084933961ecd, 14922f0cc92e, 314310166ba1, 5055b7db9411

Vendor Advisory: https://git.kernel.org/stable/c/0807e4ac59a546f2346961c5e26a98901594b205

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Check distribution-specific security advisories. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Avoid HFS+ filesystem usage

all

Do not mount or use HFS+ filesystems until patched

umount /path/to/hfsplus_volume
Remove HFS+ entries from /etc/fstab

🧯 If You Can't Patch

  • Monitor system logs for WARNING messages from hfsplus_free_extents
  • Implement process controls to limit concurrent file operations on HFS+ volumes

🔍 How to Verify

Check if Vulnerable:

Check if HFS+ filesystem is mounted: mount | grep hfsplus

Check Version:

uname -r

Verify Fix Applied:

Check kernel version is patched: uname -r and verify against distribution security advisories

📡 Detection & Monitoring

Log Indicators:

  • WARNING messages containing 'hfsplus_free_extents' in kernel logs (dmesg, /var/log/kern.log)

Network Indicators:

  • None - local filesystem issue

SIEM Query:

source="kernel" AND "hfsplus_free_extents" AND "WARNING"

🔗 References

📤 Share & Export