CVE-2025-22120: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ext4: goto right label 'out_mmap_sem' in ext4_setattr() Otherwise, if ext4_inode_attach_jinode() fails, a hung task will happen because filemap_invalidate_unlock() isn't called to unlock mapping->invalidate_lock. Like this: EXT4-fs error (device sda) in ext4_setattr:5557: Out of memory INFO: task fsstress:374 blocked for more than 122 seconds. Not tainted 6.14.0-rc1-next-20250206-xfstests-dirty #726 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:fsstress state:D stack:0 pid:374 tgid:374 ppid:373 task_flags:0x440140 flags:0x00000000 Call Trace: <TASK> __schedule+0x2c9/0x7f0 schedule+0x27/0xa0 schedule_preempt_disabled+0x15/0x30 rwsem_down_read_slowpath+0x278/0x4c0 down_read+0x59/0xb0 page_cache_ra_unbounded+0x65/0x1b0 filemap_get_pages+0x124/0x3e0 filemap_read+0x114/0x3d0 vfs_read+0x297/0x360 ksys_read+0x6c/0xe0 do_syscall_64+0x4b/0x110 entry_SYSCALL_64_after_hwframe+0x76/0x7e
AI Analysis
Technical Summary
CVE-2025-22120 is a vulnerability identified in the Linux kernel's ext4 filesystem implementation, specifically within the ext4_setattr() function. The flaw arises when the ext4_inode_attach_jinode() call fails, leading to a situation where filemap_invalidate_unlock() is not invoked to release the mapping->invalidate_lock. This results in a hung task condition, where processes attempting to modify file attributes on ext4 filesystems become blocked indefinitely. The kernel logs indicate an 'Out of memory' error and tasks such as 'fsstress' become unresponsive for extended periods (e.g., over 122 seconds), effectively causing a denial of service (DoS) on the affected system. The root cause is a missing unlock operation in error handling paths, which leads to a deadlock on the invalidate_lock semaphore. This vulnerability affects Linux kernel versions prior to the patch and is triggered during file attribute changes on ext4 filesystems. Although no known exploits are reported in the wild, the issue can severely impact system stability and availability, especially under workloads that stress filesystem attribute modifications. The vulnerability does not require user interaction but does require the ability to perform file attribute operations on ext4 partitions, which is common in many Linux environments.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux with ext4 filesystems, which are widely used in servers, cloud infrastructure, and enterprise environments across Europe. The impact is mainly a denial of service condition, where critical services or applications could hang or become unresponsive due to the kernel deadlock. This can lead to downtime, disruption of business operations, and potential data access delays. Organizations relying on Linux-based infrastructure for web hosting, databases, or file storage could experience degraded service availability. In sectors such as finance, healthcare, and public administration, where Linux servers are prevalent, such disruptions could have regulatory and operational consequences. Although no direct data breach or privilege escalation is indicated, the loss of availability can indirectly affect confidentiality and integrity by preventing timely access to data or system functions. The lack of known exploits reduces immediate risk, but the vulnerability's presence in kernel code means that attackers with local access or the ability to trigger file attribute changes could exploit it to cause service interruptions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernels to the patched versions once available from their distribution vendors. Since the issue is in the kernel ext4 code, applying official kernel security updates is the most effective measure. In the interim, organizations can monitor system logs for ext4-related errors and hung task warnings to detect potential triggering of this issue. Limiting untrusted user access to systems and restricting permissions to modify file attributes on ext4 filesystems can reduce the risk of exploitation. For critical systems, consider isolating workloads that perform frequent file attribute changes or stress filesystem operations. Implementing robust monitoring and alerting on kernel hung tasks and system responsiveness can help detect early signs of exploitation. Additionally, testing kernel updates in staging environments before deployment can ensure stability and compatibility. Organizations should also review backup and recovery procedures to minimize downtime impact in case of system hangs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland, Belgium, Finland
CVE-2025-22120: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ext4: goto right label 'out_mmap_sem' in ext4_setattr() Otherwise, if ext4_inode_attach_jinode() fails, a hung task will happen because filemap_invalidate_unlock() isn't called to unlock mapping->invalidate_lock. Like this: EXT4-fs error (device sda) in ext4_setattr:5557: Out of memory INFO: task fsstress:374 blocked for more than 122 seconds. Not tainted 6.14.0-rc1-next-20250206-xfstests-dirty #726 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:fsstress state:D stack:0 pid:374 tgid:374 ppid:373 task_flags:0x440140 flags:0x00000000 Call Trace: <TASK> __schedule+0x2c9/0x7f0 schedule+0x27/0xa0 schedule_preempt_disabled+0x15/0x30 rwsem_down_read_slowpath+0x278/0x4c0 down_read+0x59/0xb0 page_cache_ra_unbounded+0x65/0x1b0 filemap_get_pages+0x124/0x3e0 filemap_read+0x114/0x3d0 vfs_read+0x297/0x360 ksys_read+0x6c/0xe0 do_syscall_64+0x4b/0x110 entry_SYSCALL_64_after_hwframe+0x76/0x7e
AI-Powered Analysis
Technical Analysis
CVE-2025-22120 is a vulnerability identified in the Linux kernel's ext4 filesystem implementation, specifically within the ext4_setattr() function. The flaw arises when the ext4_inode_attach_jinode() call fails, leading to a situation where filemap_invalidate_unlock() is not invoked to release the mapping->invalidate_lock. This results in a hung task condition, where processes attempting to modify file attributes on ext4 filesystems become blocked indefinitely. The kernel logs indicate an 'Out of memory' error and tasks such as 'fsstress' become unresponsive for extended periods (e.g., over 122 seconds), effectively causing a denial of service (DoS) on the affected system. The root cause is a missing unlock operation in error handling paths, which leads to a deadlock on the invalidate_lock semaphore. This vulnerability affects Linux kernel versions prior to the patch and is triggered during file attribute changes on ext4 filesystems. Although no known exploits are reported in the wild, the issue can severely impact system stability and availability, especially under workloads that stress filesystem attribute modifications. The vulnerability does not require user interaction but does require the ability to perform file attribute operations on ext4 partitions, which is common in many Linux environments.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux with ext4 filesystems, which are widely used in servers, cloud infrastructure, and enterprise environments across Europe. The impact is mainly a denial of service condition, where critical services or applications could hang or become unresponsive due to the kernel deadlock. This can lead to downtime, disruption of business operations, and potential data access delays. Organizations relying on Linux-based infrastructure for web hosting, databases, or file storage could experience degraded service availability. In sectors such as finance, healthcare, and public administration, where Linux servers are prevalent, such disruptions could have regulatory and operational consequences. Although no direct data breach or privilege escalation is indicated, the loss of availability can indirectly affect confidentiality and integrity by preventing timely access to data or system functions. The lack of known exploits reduces immediate risk, but the vulnerability's presence in kernel code means that attackers with local access or the ability to trigger file attribute changes could exploit it to cause service interruptions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernels to the patched versions once available from their distribution vendors. Since the issue is in the kernel ext4 code, applying official kernel security updates is the most effective measure. In the interim, organizations can monitor system logs for ext4-related errors and hung task warnings to detect potential triggering of this issue. Limiting untrusted user access to systems and restricting permissions to modify file attributes on ext4 filesystems can reduce the risk of exploitation. For critical systems, consider isolating workloads that perform frequent file attribute changes or stress filesystem operations. Implementing robust monitoring and alerting on kernel hung tasks and system responsiveness can help detect early signs of exploitation. Additionally, testing kernel updates in staging environments before deployment can ensure stability and compatibility. Organizations should also review backup and recovery procedures to minimize downtime impact in case of system hangs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.823Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9832c4522896dcbe81a8
Added to database: 5/21/2025, 9:09:06 AM
Last enriched: 7/3/2025, 9:28:52 PM
Last updated: 8/1/2025, 1:48:44 PM
Views: 19
Related Threats
CVE-2025-9022: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-9021: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-9020: Use After Free in PX4 PX4-Autopilot
LowCVE-2025-8604: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wptb WP Table Builder – WordPress Table Plugin
MediumCVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.