CVE-2025-38701

5.5 MEDIUM

📋 TL;DR

A Linux kernel vulnerability in the ext4 filesystem where a maliciously crafted filesystem image triggers a kernel panic (BUG_ON) when an inode has the INLINE_DATA_FL flag set but lacks the required system.data extended attribute. This affects systems using ext4 filesystems and can be exploited by mounting a malicious filesystem image. The vulnerability leads to denial of service through kernel panic.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not specified in CVE, but patches available in stable kernel trees
Operating Systems: Linux distributions using ext4 filesystem
Default Config Vulnerable: ⚠️ Yes
Notes: Requires ext4 filesystem usage and ability to mount malicious filesystem images

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data loss or service disruption.

🟠

Likely Case

Local denial of service through kernel panic when mounting a malicious filesystem image.

🟢

If Mitigated

System continues operation with filesystem corruption reported via EXT4_ERROR_INODE instead of crashing.

🌐 Internet-Facing: LOW - Requires mounting malicious filesystem, typically not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local users or processes with filesystem mount privileges could cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires creating and mounting a specially crafted ext4 filesystem image

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel stable releases containing commits 099b847ccc6c1ad2f805d13cfbcc83f5b6d4bc42 and related

Vendor Advisory: https://git.kernel.org/stable/c/099b847ccc6c1ad2f805d13cfbcc83f5b6d4bc42

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from distribution vendor. 2. Reboot system to load new kernel.

🔧 Temporary Workarounds

Restrict filesystem mounting

all

Limit ability to mount filesystems to trusted users only

chmod 700 /bin/mount
setfacl -m u:trusted_user:rwx /bin/mount

🧯 If You Can't Patch

  • Implement strict access controls on mount command and filesystem image handling
  • Monitor for unexpected kernel panics and investigate mount operations

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if patches are applied: grep -q '099b847ccc6c1ad2f805d13cfbcc83f5b6d4bc42' /proc/kallsyms || echo 'Possibly vulnerable'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel contains the fix: uname -r and check with distribution vendor for patched kernel version

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/messages or dmesg
  • EXT4-fs error messages indicating corrupted filesystem

Network Indicators:

  • None - local exploitation only

SIEM Query:

source="kernel" AND ("BUG:" OR "kernel panic" OR "EXT4-fs error")

🔗 References

📤 Share & Export