CVE-2025-38066
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-12-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 5.4.294 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.238 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.185 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.141 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.93 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.31 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.14.9 (exc) |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-617 | The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's device mapper cache (dm cache) where a cache device that fails to resume due to mapping errors can cause a kernel BUG_ON error. When a cache device resume operation fails, it leaves a partially initialized policy object. If the system retries the resume operation, it risks triggering a BUG_ON error because the cache mappings are reloaded into this incomplete policy object. The issue arises from retrying resume operations on devices that have already failed, which can cause kernel crashes.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (trigger a BUG_ON), leading to system instability or downtime. If a cache device fails to resume and the system retries the operation, it can cause a kernel panic, potentially disrupting services and requiring a system reboot to recover. This can impact system availability and reliability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to resume a cache device that has corrupted or partially initialized cache metadata, which may trigger a kernel BUG_ON error. The provided reproduce steps include commands such as 'dmsetup create', 'cache_restore', and 'dmsetup resume' to simulate the failure. Monitoring kernel logs for BUG_ON messages related to dm-cache, specifically errors like 'kernel BUG at drivers/md/dm-cache-policy-smq.c' and 'Oops: invalid opcode', can indicate the presence of this issue.
What immediate steps should I take to mitigate this vulnerability?
The fix for this vulnerability is to disallow resume operations for cache devices that failed the initial resume attempt. Therefore, the immediate mitigation step is to ensure that the system or kernel version includes the patch that blocks retries on failed device resumes to prevent triggering BUG_ON. Until patched, avoid resuming cache devices that have experienced resume failures due to mapping errors.