CVE-2025-37876: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: netfs: Only create /proc/fs/netfs with CONFIG_PROC_FS When testing a special config: CONFIG_NETFS_SUPPORTS=y CONFIG_PROC_FS=n The system crashes with something like: [ 3.766197] ------------[ cut here ]------------ [ 3.766484] kernel BUG at mm/mempool.c:560! [ 3.766789] Oops: invalid opcode: 0000 [#1] SMP NOPTI [ 3.767123] CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Tainted: G W [ 3.767777] Tainted: [W]=WARN [ 3.767968] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), [ 3.768523] RIP: 0010:mempool_alloc_slab.cold+0x17/0x19 [ 3.768847] Code: 50 fe ff 58 5b 5d 41 5c 41 5d 41 5e 41 5f e9 93 95 13 00 [ 3.769977] RSP: 0018:ffffc90000013998 EFLAGS: 00010286 [ 3.770315] RAX: 000000000000002f RBX: ffff888100ba8640 RCX: 0000000000000000 [ 3.770749] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 00000000ffffffff [ 3.771217] RBP: 0000000000092880 R08: 0000000000000000 R09: ffffc90000013828 [ 3.771664] R10: 0000000000000001 R11: 00000000ffffffea R12: 0000000000092cc0 [ 3.772117] R13: 0000000000000400 R14: ffff8881004b1620 R15: ffffea0004ef7e40 [ 3.772554] FS: 0000000000000000(0000) GS:ffff8881b5f3c000(0000) knlGS:0000000000000000 [ 3.773061] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3.773443] CR2: ffffffff830901b4 CR3: 0000000004296001 CR4: 0000000000770ef0 [ 3.773884] PKRU: 55555554 [ 3.774058] Call Trace: [ 3.774232] <TASK> [ 3.774371] mempool_alloc_noprof+0x6a/0x190 [ 3.774649] ? _printk+0x57/0x80 [ 3.774862] netfs_alloc_request+0x85/0x2ce [ 3.775147] netfs_readahead+0x28/0x170 [ 3.775395] read_pages+0x6c/0x350 [ 3.775623] ? srso_alias_return_thunk+0x5/0xfbef5 [ 3.775928] page_cache_ra_unbounded+0x1bd/0x2a0 [ 3.776247] filemap_get_pages+0x139/0x970 [ 3.776510] ? srso_alias_return_thunk+0x5/0xfbef5 [ 3.776820] filemap_read+0xf9/0x580 [ 3.777054] ? srso_alias_return_thunk+0x5/0xfbef5 [ 3.777368] ? srso_alias_return_thunk+0x5/0xfbef5 [ 3.777674] ? find_held_lock+0x32/0x90 [ 3.777929] ? netfs_start_io_read+0x19/0x70 [ 3.778221] ? netfs_start_io_read+0x19/0x70 [ 3.778489] ? srso_alias_return_thunk+0x5/0xfbef5 [ 3.778800] ? lock_acquired+0x1e6/0x450 [ 3.779054] ? srso_alias_return_thunk+0x5/0xfbef5 [ 3.779379] netfs_buffered_read_iter+0x57/0x80 [ 3.779670] __kernel_read+0x158/0x2c0 [ 3.779927] bprm_execve+0x300/0x7a0 [ 3.780185] kernel_execve+0x10c/0x140 [ 3.780423] ? __pfx_kernel_init+0x10/0x10 [ 3.780690] kernel_init+0xd5/0x150 [ 3.780910] ret_from_fork+0x2d/0x50 [ 3.781156] ? __pfx_kernel_init+0x10/0x10 [ 3.781414] ret_from_fork_asm+0x1a/0x30 [ 3.781677] </TASK> [ 3.781823] Modules linked in: [ 3.782065] ---[ end trace 0000000000000000 ]--- This is caused by the following error path in netfs_init(): if (!proc_mkdir("fs/netfs", NULL)) goto error_proc; Fix this by adding ifdef in netfs_main(), so that /proc/fs/netfs is only created with CONFIG_PROC_FS.
AI Analysis
Technical Summary
CVE-2025-37876 is a vulnerability identified in the Linux kernel related to the netfs filesystem module. The issue arises specifically when the kernel is configured with CONFIG_NETFS_SUPPORTS=y and CONFIG_PROC_FS=n. Under these conditions, the kernel attempts to create the /proc/fs/netfs directory unconditionally, despite the /proc filesystem not being enabled. This leads to a kernel crash due to a NULL pointer dereference or invalid memory access during the initialization of netfs. The crash manifests as a kernel BUG at mm/mempool.c, causing an invalid opcode exception and system panic. The root cause is that the netfs_init() function tries to create the procfs directory without checking if CONFIG_PROC_FS is enabled, violating the expected conditional compilation guards. The fix involves adding an #ifdef guard around the procfs directory creation so that /proc/fs/netfs is only created when CONFIG_PROC_FS is enabled. This vulnerability results in a denial of service (DoS) condition by crashing the kernel during boot or module initialization when the specific kernel configuration is used. It does not appear to allow privilege escalation or code execution directly but can cause system unavailability. The vulnerability affects Linux kernel versions containing the specified commit hashes and is documented as published on May 9, 2025. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations relying on Linux systems, especially those using custom or minimal kernel configurations that disable procfs (CONFIG_PROC_FS=n) but enable netfs support (CONFIG_NETFS_SUPPORTS=y), this vulnerability can cause critical system instability and denial of service. Systems affected may fail to boot properly or crash unexpectedly, leading to downtime and potential disruption of business operations. This is particularly impactful for embedded Linux devices, specialized appliances, or virtualized environments where custom kernel builds are common. Although the vulnerability does not directly lead to data breaches or privilege escalation, the loss of availability can affect critical infrastructure, cloud services, and enterprise servers running Linux. Organizations in sectors such as telecommunications, manufacturing, and cloud service providers in Europe could face operational risks if their systems are affected. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental crashes or targeted disruption by attackers aware of the configuration specifics.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Audit their Linux kernel configurations to identify if CONFIG_NETFS_SUPPORTS=y is enabled alongside CONFIG_PROC_FS=n. 2) Apply the official Linux kernel patches that add the necessary conditional compilation guards to netfs_init(), ensuring /proc/fs/netfs is only created when procfs is enabled. 3) Rebuild and redeploy affected kernels with the patch applied, especially for custom or embedded Linux distributions. 4) For environments where kernel recompilation is not feasible, consider disabling netfs support if it is not required. 5) Implement monitoring to detect kernel panics or crashes related to mempool allocation or netfs initialization. 6) Test kernel updates in staging environments to verify stability before production deployment. 7) Maintain up-to-date Linux kernel versions and subscribe to vendor security advisories for timely patching. These steps go beyond generic advice by focusing on configuration auditing and targeted patch application relevant to this specific vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2025-37876: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: netfs: Only create /proc/fs/netfs with CONFIG_PROC_FS When testing a special config: CONFIG_NETFS_SUPPORTS=y CONFIG_PROC_FS=n The system crashes with something like: [ 3.766197] ------------[ cut here ]------------ [ 3.766484] kernel BUG at mm/mempool.c:560! [ 3.766789] Oops: invalid opcode: 0000 [#1] SMP NOPTI [ 3.767123] CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Tainted: G W [ 3.767777] Tainted: [W]=WARN [ 3.767968] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), [ 3.768523] RIP: 0010:mempool_alloc_slab.cold+0x17/0x19 [ 3.768847] Code: 50 fe ff 58 5b 5d 41 5c 41 5d 41 5e 41 5f e9 93 95 13 00 [ 3.769977] RSP: 0018:ffffc90000013998 EFLAGS: 00010286 [ 3.770315] RAX: 000000000000002f RBX: ffff888100ba8640 RCX: 0000000000000000 [ 3.770749] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 00000000ffffffff [ 3.771217] RBP: 0000000000092880 R08: 0000000000000000 R09: ffffc90000013828 [ 3.771664] R10: 0000000000000001 R11: 00000000ffffffea R12: 0000000000092cc0 [ 3.772117] R13: 0000000000000400 R14: ffff8881004b1620 R15: ffffea0004ef7e40 [ 3.772554] FS: 0000000000000000(0000) GS:ffff8881b5f3c000(0000) knlGS:0000000000000000 [ 3.773061] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3.773443] CR2: ffffffff830901b4 CR3: 0000000004296001 CR4: 0000000000770ef0 [ 3.773884] PKRU: 55555554 [ 3.774058] Call Trace: [ 3.774232] <TASK> [ 3.774371] mempool_alloc_noprof+0x6a/0x190 [ 3.774649] ? _printk+0x57/0x80 [ 3.774862] netfs_alloc_request+0x85/0x2ce [ 3.775147] netfs_readahead+0x28/0x170 [ 3.775395] read_pages+0x6c/0x350 [ 3.775623] ? srso_alias_return_thunk+0x5/0xfbef5 [ 3.775928] page_cache_ra_unbounded+0x1bd/0x2a0 [ 3.776247] filemap_get_pages+0x139/0x970 [ 3.776510] ? srso_alias_return_thunk+0x5/0xfbef5 [ 3.776820] filemap_read+0xf9/0x580 [ 3.777054] ? srso_alias_return_thunk+0x5/0xfbef5 [ 3.777368] ? srso_alias_return_thunk+0x5/0xfbef5 [ 3.777674] ? find_held_lock+0x32/0x90 [ 3.777929] ? netfs_start_io_read+0x19/0x70 [ 3.778221] ? netfs_start_io_read+0x19/0x70 [ 3.778489] ? srso_alias_return_thunk+0x5/0xfbef5 [ 3.778800] ? lock_acquired+0x1e6/0x450 [ 3.779054] ? srso_alias_return_thunk+0x5/0xfbef5 [ 3.779379] netfs_buffered_read_iter+0x57/0x80 [ 3.779670] __kernel_read+0x158/0x2c0 [ 3.779927] bprm_execve+0x300/0x7a0 [ 3.780185] kernel_execve+0x10c/0x140 [ 3.780423] ? __pfx_kernel_init+0x10/0x10 [ 3.780690] kernel_init+0xd5/0x150 [ 3.780910] ret_from_fork+0x2d/0x50 [ 3.781156] ? __pfx_kernel_init+0x10/0x10 [ 3.781414] ret_from_fork_asm+0x1a/0x30 [ 3.781677] </TASK> [ 3.781823] Modules linked in: [ 3.782065] ---[ end trace 0000000000000000 ]--- This is caused by the following error path in netfs_init(): if (!proc_mkdir("fs/netfs", NULL)) goto error_proc; Fix this by adding ifdef in netfs_main(), so that /proc/fs/netfs is only created with CONFIG_PROC_FS.
AI-Powered Analysis
Technical Analysis
CVE-2025-37876 is a vulnerability identified in the Linux kernel related to the netfs filesystem module. The issue arises specifically when the kernel is configured with CONFIG_NETFS_SUPPORTS=y and CONFIG_PROC_FS=n. Under these conditions, the kernel attempts to create the /proc/fs/netfs directory unconditionally, despite the /proc filesystem not being enabled. This leads to a kernel crash due to a NULL pointer dereference or invalid memory access during the initialization of netfs. The crash manifests as a kernel BUG at mm/mempool.c, causing an invalid opcode exception and system panic. The root cause is that the netfs_init() function tries to create the procfs directory without checking if CONFIG_PROC_FS is enabled, violating the expected conditional compilation guards. The fix involves adding an #ifdef guard around the procfs directory creation so that /proc/fs/netfs is only created when CONFIG_PROC_FS is enabled. This vulnerability results in a denial of service (DoS) condition by crashing the kernel during boot or module initialization when the specific kernel configuration is used. It does not appear to allow privilege escalation or code execution directly but can cause system unavailability. The vulnerability affects Linux kernel versions containing the specified commit hashes and is documented as published on May 9, 2025. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations relying on Linux systems, especially those using custom or minimal kernel configurations that disable procfs (CONFIG_PROC_FS=n) but enable netfs support (CONFIG_NETFS_SUPPORTS=y), this vulnerability can cause critical system instability and denial of service. Systems affected may fail to boot properly or crash unexpectedly, leading to downtime and potential disruption of business operations. This is particularly impactful for embedded Linux devices, specialized appliances, or virtualized environments where custom kernel builds are common. Although the vulnerability does not directly lead to data breaches or privilege escalation, the loss of availability can affect critical infrastructure, cloud services, and enterprise servers running Linux. Organizations in sectors such as telecommunications, manufacturing, and cloud service providers in Europe could face operational risks if their systems are affected. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental crashes or targeted disruption by attackers aware of the configuration specifics.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Audit their Linux kernel configurations to identify if CONFIG_NETFS_SUPPORTS=y is enabled alongside CONFIG_PROC_FS=n. 2) Apply the official Linux kernel patches that add the necessary conditional compilation guards to netfs_init(), ensuring /proc/fs/netfs is only created when procfs is enabled. 3) Rebuild and redeploy affected kernels with the patch applied, especially for custom or embedded Linux distributions. 4) For environments where kernel recompilation is not feasible, consider disabling netfs support if it is not required. 5) Implement monitoring to detect kernel panics or crashes related to mempool allocation or netfs initialization. 6) Test kernel updates in staging environments to verify stability before production deployment. 7) Maintain up-to-date Linux kernel versions and subscribe to vendor security advisories for timely patching. These steps go beyond generic advice by focusing on configuration auditing and targeted patch application relevant to this specific vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.960Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd7097
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/4/2025, 12:56:07 AM
Last updated: 7/7/2025, 5:06:30 AM
Views: 6
Related Threats
CVE-2025-45479: n/a
CriticalCVE-2025-7363: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Wikimedia Foundation Mediawiki - TitleIcon extension
HighCVE-2025-7188: SQL Injection in code-projects Chat System
MediumCVE-2025-47135: Out-of-bounds Read (CWE-125) in Adobe Dimension
MediumCVE-2025-30312: Out-of-bounds Write (CWE-787) in Adobe Dimension
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.