Skip to main content

CVE-2025-22120: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-22120cvecve-2025-22120
Published: Wed Apr 16 2025 (04/16/2025, 14:13:05 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ext4: goto right label 'out_mmap_sem' in ext4_setattr() Otherwise, if ext4_inode_attach_jinode() fails, a hung task will happen because filemap_invalidate_unlock() isn't called to unlock mapping->invalidate_lock. Like this: EXT4-fs error (device sda) in ext4_setattr:5557: Out of memory INFO: task fsstress:374 blocked for more than 122 seconds. Not tainted 6.14.0-rc1-next-20250206-xfstests-dirty #726 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:fsstress state:D stack:0 pid:374 tgid:374 ppid:373 task_flags:0x440140 flags:0x00000000 Call Trace: <TASK> __schedule+0x2c9/0x7f0 schedule+0x27/0xa0 schedule_preempt_disabled+0x15/0x30 rwsem_down_read_slowpath+0x278/0x4c0 down_read+0x59/0xb0 page_cache_ra_unbounded+0x65/0x1b0 filemap_get_pages+0x124/0x3e0 filemap_read+0x114/0x3d0 vfs_read+0x297/0x360 ksys_read+0x6c/0xe0 do_syscall_64+0x4b/0x110 entry_SYSCALL_64_after_hwframe+0x76/0x7e

AI-Powered Analysis

AILast updated: 07/03/2025, 21:28:52 UTC

Technical Analysis

CVE-2025-22120 is a vulnerability identified in the Linux kernel's ext4 filesystem implementation, specifically within the ext4_setattr() function. The flaw arises when the ext4_inode_attach_jinode() call fails, leading to a situation where filemap_invalidate_unlock() is not invoked to release the mapping->invalidate_lock. This results in a hung task condition, where processes attempting to modify file attributes on ext4 filesystems become blocked indefinitely. The kernel logs indicate an 'Out of memory' error and tasks such as 'fsstress' become unresponsive for extended periods (e.g., over 122 seconds), effectively causing a denial of service (DoS) on the affected system. The root cause is a missing unlock operation in error handling paths, which leads to a deadlock on the invalidate_lock semaphore. This vulnerability affects Linux kernel versions prior to the patch and is triggered during file attribute changes on ext4 filesystems. Although no known exploits are reported in the wild, the issue can severely impact system stability and availability, especially under workloads that stress filesystem attribute modifications. The vulnerability does not require user interaction but does require the ability to perform file attribute operations on ext4 partitions, which is common in many Linux environments.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux with ext4 filesystems, which are widely used in servers, cloud infrastructure, and enterprise environments across Europe. The impact is mainly a denial of service condition, where critical services or applications could hang or become unresponsive due to the kernel deadlock. This can lead to downtime, disruption of business operations, and potential data access delays. Organizations relying on Linux-based infrastructure for web hosting, databases, or file storage could experience degraded service availability. In sectors such as finance, healthcare, and public administration, where Linux servers are prevalent, such disruptions could have regulatory and operational consequences. Although no direct data breach or privilege escalation is indicated, the loss of availability can indirectly affect confidentiality and integrity by preventing timely access to data or system functions. The lack of known exploits reduces immediate risk, but the vulnerability's presence in kernel code means that attackers with local access or the ability to trigger file attribute changes could exploit it to cause service interruptions.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating their Linux kernels to the patched versions once available from their distribution vendors. Since the issue is in the kernel ext4 code, applying official kernel security updates is the most effective measure. In the interim, organizations can monitor system logs for ext4-related errors and hung task warnings to detect potential triggering of this issue. Limiting untrusted user access to systems and restricting permissions to modify file attributes on ext4 filesystems can reduce the risk of exploitation. For critical systems, consider isolating workloads that perform frequent file attribute changes or stress filesystem operations. Implementing robust monitoring and alerting on kernel hung tasks and system responsiveness can help detect early signs of exploitation. Additionally, testing kernel updates in staging environments before deployment can ensure stability and compatibility. Organizations should also review backup and recovery procedures to minimize downtime impact in case of system hangs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.823Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9832c4522896dcbe81a8

Added to database: 5/21/2025, 9:09:06 AM

Last enriched: 7/3/2025, 9:28:52 PM

Last updated: 8/1/2025, 1:48:44 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats