CVE-2025-71161

5.5 MEDIUM

📋 TL;DR

A vulnerability in the Linux kernel's dm-verity subsystem allows denial-of-service attacks through recursive forward error correction. Attackers can create specially crafted dm-verity images that cause system processes to hang indefinitely. This affects Linux systems using dm-verity for block device integrity verification.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with dm-verity recursive FEC enabled (specific versions not specified in CVE)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using dm-verity with forward error correction enabled. The vulnerability was demonstrated by Red Hat QE team with a specially crafted image.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability due to kernel process deadlock, requiring hard reboot and potential data corruption.

🟠

Likely Case

Targeted denial-of-service affecting specific services or processes using dm-verity, causing service disruption.

🟢

If Mitigated

Limited impact with proper monitoring and process isolation, but still requires system intervention.

🌐 Internet-Facing: LOW - Requires local access or ability to load malicious dm-verity images.
🏢 Internal Only: MEDIUM - Malicious insiders or compromised accounts could exploit this to disrupt critical systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to load a malicious dm-verity image onto the target system. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel commits 232948cf600fba69aff36b25d85ef91a73a35756 and d9f3e47d3fae0c101d9094bc956ed24e7a0ee801

Vendor Advisory: https://git.kernel.org/stable/c/232948cf600fba69aff36b25d85ef91a73a35756

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load new kernel. 3. Verify dm-verity functionality if needed for system operation.

🔧 Temporary Workarounds

Disable dm-verity FEC

linux

Disable forward error correction in dm-verity configuration to prevent recursive correction.

Modify dm-verity table to remove 'fec' options
Recreate dm-verity devices without FEC support

Restrict dm-verity image loading

linux

Implement access controls to prevent unauthorized loading of dm-verity images.

Use SELinux/AppArmor policies to restrict device-mapper operations
Implement user/group restrictions on /dev/mapper access

🧯 If You Can't Patch

  • Implement strict access controls on who can load dm-verity images
  • Monitor system for processes stuck in 'D' state and implement automated recovery procedures

🔍 How to Verify

Check if Vulnerable:

Check if system uses dm-verity with FEC enabled: 'dmsetup table' and look for 'fec' options. Check kernel version against patched releases.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel contains fix commits: 'uname -r' and check kernel source or distribution patch notes. Test with known problematic images if available.

📡 Detection & Monitoring

Log Indicators:

  • Processes stuck in 'D' state (uninterruptible sleep)
  • High CPU usage by kernel processes
  • System load average increasing without corresponding user process activity

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Process monitoring for state='D' AND (name='udev-worker' OR command contains 'dm-verity')

🔗 References

📤 Share & Export