CVE-2025-38063
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-12-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 6.1.141 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.93 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.31 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.14.9 (exc) |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's device mapper (dm) layer where an unconditional IO throttle happens due to the handling of REQ_PREFLUSH requests. When a bio with REQ_PREFLUSH is submitted, the function __send_empty_flush() generates a flush_bio with flags that cause it to be throttled by the writeback throttling mechanism (wbt_wait()). This unintended throttling delays flush operations, which can affect metadata writes, such as those from the xfs filesystem, causing performance issues or potential system instability. The fix involves adding the REQ_IDLE flag to the flush_bio operation flags to prevent throttling by wbt_wait().
How can this vulnerability impact me? :
This vulnerability can cause unintended delays in IO flush operations, particularly affecting metadata writes in filesystems like xfs. This can lead to degraded system performance, increased latency in IO operations, and potentially impact system stability or data integrity under heavy IO load conditions.
What immediate steps should I take to mitigate this vulnerability?
Update the Linux kernel to a version that includes the fix for this vulnerability, specifically the commit that conditionally adds REQ_IDLE to flush_bio.bi_opf to prevent IO throttling caused by REQ_PREFLUSH. This will avoid the issue where flush_bio is throttled by wbt_wait().