CVE-2025-38059
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's btrfs filesystem when using the mount option 'rescue=idatacsums'. This option skips loading the checksum (csum) tree, causing data checksum verification to be ignored. The scrub operation, which is supposed to verify data integrity, does not check if the csum tree is present and attempts to access it anyway, leading to a NULL pointer dereference and a kernel crash.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to crash during a read-only scrub operation on a btrfs filesystem mounted with 'rescue=idatacsums'. This results in a denial of service due to the kernel NULL pointer dereference, potentially leading to system instability or downtime.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid using the mount option "rescue=idatacsums" on btrfs filesystems when performing read-only scrub operations until a kernel update with the fix is applied. Ensure your Linux kernel is updated to a version that includes the fix which checks both extent and csum tree roots before any tree search to prevent NULL pointer dereference crashes.