CVE-2025-38163
BaseFortify
Publication date: 2025-07-03
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 3.8 (inc) to 5.4.295 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.239 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.186 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.142 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.94 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.34 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.3 (exc) |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's f2fs filesystem. It involves an inconsistency in the total_valid_block_count field, which tracks valid blocks. When this count is inconsistent with the blocks mapped by an inode, it previously caused a kernel panic (crash). The fix changes this behavior to avoid panic by logging the issue and setting a filesystem check (fsck) flag instead.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to panic (crash) when the total_valid_block_count is inconsistent, potentially leading to system instability or downtime. The fix prevents this panic, improving system reliability by logging the inconsistency and marking the filesystem for checking rather than crashing.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for the specific bug message related to f2fs, such as a kernel BUG at fs/f2fs/f2fs.h:2521 and messages involving dec_valid_block_count. You can check the kernel log using commands like 'dmesg | grep f2fs' or 'journalctl -k | grep f2fs' to look for these error messages indicating the issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where this f2fs vulnerability is fixed. Additionally, monitoring logs for the bug message and running filesystem checks (fsck) on f2fs partitions to detect and repair inconsistencies can help prevent triggering kernel panic.