CVE-2025-38650
BaseFortify
Publication date: 2025-08-22
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.10.244 |
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's hfsplus filesystem code. It involves a problematic mutex lock check in the hfsplus_free_extents function that can trigger warnings and abnormal behavior when multiple threads concurrently perform file operations like release, set attributes, unlink, or get block on different files. The issue arises because several threads may try to lock the shared extents tree simultaneously, causing a WARN_ON condition when one thread detects the tree is already locked by another. The fix removes this incorrect warning to avoid deadlocks and erroneous error reports.
How can this vulnerability impact me? :
This vulnerability can lead to deadlocks or abnormal warnings in the Linux kernel when using the hfsplus filesystem under concurrent file operations. This may cause system instability, errors reported by testing tools like syzbot and xfstest, and potentially impact system reliability during file truncation or modification operations on hfsplus filesystems.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for kernel warnings related to hfsplus filesystem operations, specifically WARN_ON triggers in the hfsplus_free_extents function. You can check the kernel logs for messages similar to the following warning: 'WARNING: CPU: ... at fs/hfsplus/extents.c:346 hfsplus_free_extents'. Use the command 'dmesg | grep hfsplus' or 'journalctl -k | grep hfsplus' to look for such warnings indicating concurrent access issues in the hfsplus filesystem.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where the hfsplus mutex_lock check in hfsplus_free_extents has been removed and the deadlock issue fixed (as per commit 31651c607151). Until the update is applied, avoid running concurrent operations such as hfsplus_file_release, hfsplus_setattr, hfsplus_unlink, and hfsplus_get_block on the hfsplus filesystem to reduce the chance of triggering the warning and potential deadlocks.