CVE-2025-38347
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's f2fs filesystem. It occurs because of a missing sanity check on inode (ino) and extended attribute node IDs (xnid). When a corrupted directory has an xattr_nid equal to its inode number, the system tries to lock the same inode page twice during the creation of a new node (mknod), causing a deadlock. This deadlock blocks tasks and can freeze operations involving the filesystem. The fix involves adding a sanity check on ino and xnid to prevent this condition.
How can this vulnerability impact me? :
This vulnerability can cause a deadlock in the Linux kernel's f2fs filesystem, leading to tasks being blocked indefinitely. This can result in system hangs or freezes when performing filesystem operations like creating new nodes in corrupted directories, potentially impacting system stability and availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for hung tasks related to f2fs operations, such as tasks blocked for extended periods (e.g., more than 143 seconds) involving f2fs inode operations. One can look for kernel logs indicating blocked tasks with call traces involving f2fs functions. For example, checking kernel logs with commands like 'dmesg | grep -i f2fs' or 'journalctl -k | grep -i f2fs' may reveal symptoms. Additionally, inspecting for deadlocks during mknod operations on f2fs filesystems might help. Specific commands to dump and check inode metadata, such as 'dump.f2fs -i <inode_number> <image_file>', can be used to verify if xattr_nid equals i_ino, indicating corruption related to this vulnerability.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves applying the fix that adds sanity checks on inode (ino) and xattr node IDs (xnid) in the f2fs filesystem code to prevent deadlocks caused by corrupted inodes. Until the fix is applied, monitoring for hung tasks and avoiding operations that trigger mknod in corrupted directories on f2fs filesystems can reduce risk. Disabling hung task timeout messages with 'echo 0 > /proc/sys/kernel/hung_task_timeout_secs' may suppress symptoms but does not fix the underlying issue. Ultimately, updating the Linux kernel to a version that includes this fix is necessary to fully mitigate the vulnerability.