CVE-2025-38260
BaseFortify
Publication date: 2025-07-09
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 6.7 (inc) to 6.12.36 (inc) |
| debian | debian_linux | 11.0 |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's Btrfs filesystem. It occurs when the checksum (csum) tree root is corrupted and the filesystem is mounted with the 'rescue=ibadroots' option. Normally, a corrupted csum tree root should trigger a flag (BTRFS_FS_STATE_NO_DATA_CSUMS) to ignore checksum searches on future data reads. However, due to improper error handling, this flag is not set when the csum tree root is corrupted, leading to unexpected checksum lookups. This can cause a kernel crash due to a NULL pointer dereference during checksum verification.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel panic) when accessing a Btrfs filesystem with a corrupted checksum tree root under certain mount options. This can lead to system instability, denial of service, and potential data access interruptions on affected systems.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel logs for specific BTRFS checksum errors and kernel crashes related to the csum tree. Look for messages such as 'BTRFS warning: checksum verify failed' and kernel oops traces involving 'btrfs_lookup_csum'. You can check kernel logs using commands like 'dmesg | grep BTRFS' or 'journalctl -k | grep BTRFS'. Additionally, mounting the affected BTRFS filesystem with the 'rescue=ibadroots' option may reveal errors related to corrupted checksum tree roots.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix for this vulnerability. The fix ensures proper handling of corrupted checksum tree roots by correctly setting the BTRFS_FS_STATE_NO_DATA_CSUMS flag to avoid kernel crashes. Until the update is applied, avoid mounting affected BTRFS filesystems without the 'rescue=ibadroots' mount option, which helps to handle corrupted checksum roots more safely.