CVE-2025-39691

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the Linux kernel's buffer handling code that can lead to kernel memory corruption. It affects systems using the NTFS3 filesystem driver during mount operations. The vulnerability allows local attackers to potentially crash the system or escalate privileges.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Kernel versions around 6.16.0-862.14.0.6.x86_64 and related versions with the vulnerable code
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the NTFS3 filesystem driver. The vulnerability triggers during NTFS filesystem mount operations.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, or potential privilege escalation to root if combined with other vulnerabilities.

🟠

Likely Case

System crash or kernel panic during NTFS filesystem mount operations.

🟢

If Mitigated

No impact if patched or if NTFS3 driver is not used.

🌐 Internet-Facing: LOW - Requires local access to trigger.
🏢 Internal Only: MEDIUM - Local users or processes can trigger the vulnerability during NTFS mount operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to mount NTFS filesystems. The vulnerability is triggered during specific timing conditions in buffer handling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in kernel commits: 03b40bf5d0389ca23ae6857ee25789f0e0b47ce8, 042cf48ecf67f72c8b3846c7fac678f472712ff3, 3169edb8945c295cf89120fc6b2c35cfe3ad4c9e, 70a09115da586bf662c3bae9c0c4a1b99251fad9, 7375f22495e7cd1c5b3b5af9dcc4f6dffe34ce49

Vendor Advisory: https://git.kernel.org/stable/c/03b40bf5d0389ca23ae6857ee25789f0e0b47ce8

Restart Required: Yes

Instructions:

1. Update to a patched kernel version from your distribution vendor. 2. Reboot the system to load the new kernel. 3. Verify the fix is applied by checking kernel version.

🔧 Temporary Workarounds

Disable NTFS3 driver

linux

Prevent loading of the NTFS3 filesystem driver to avoid triggering the vulnerability

echo 'blacklist ntfs3' >> /etc/modprobe.d/blacklist-ntfs3.conf
update-initramfs -u
reboot

Restrict NTFS mount permissions

linux

Limit which users can mount NTFS filesystems

chmod 750 /bin/mount
chmod 750 /sbin/mount.ntfs3
setfacl -m u:root:rwx /bin/mount /sbin/mount.ntfs3

🧯 If You Can't Patch

  • Restrict local user access to systems with NTFS mounts
  • Monitor for NTFS mount attempts and system crashes

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if NTFS3 module is loaded: uname -r && lsmod | grep ntfs3

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and check dmesg for absence of KASAN stack-out-of-bounds errors related to bh_read

📡 Detection & Monitoring

Log Indicators:

  • KASAN: stack-out-of-bounds errors in kernel logs
  • System crashes during NTFS mount operations
  • end_buffer_read_sync+0xe3/0x110 in stack traces

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND "KASAN: stack-out-of-bounds" AND "bh_read" OR "end_buffer_read_sync"

🔗 References

📤 Share & Export