CVE-2025-39791
BaseFortify
Publication date: 2025-09-11
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the dm-crypt module in the Linux kernel where write BIOs (block I/O operations) to zoned dm-crypt targets are partially accepted and split incorrectly. The splitting of write BIOs without proper handling causes deadlocks due to queue freezes and can lead to incorrect sector returns during zone append operations. This results in potential file system data corruption, especially affecting file systems like xfs or btrfs. The issue arises because dm-crypt relies on splitting large BIOs for performance, but for zoned targets, this splitting breaks the sequential write order and causes problems in zone append emulation.
How can this vulnerability impact me? :
This vulnerability can cause deadlocks in the Linux kernel's block I/O processing when using dm-crypt with zoned block devices, potentially freezing write operations. Additionally, it can lead to file system data corruption on affected file systems such as xfs or btrfs due to incorrect sector information being returned during zone append operations. This can result in data loss or corruption on encrypted storage devices using dm-crypt with zoned targets.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for CVE-2025-39791. The fix involves changes to dm-crypt to prevent partial acceptance of write BIOs with zoned targets, avoiding deadlocks and data corruption. There are no specific configuration changes or workarounds mentioned, so applying the patched kernel is the recommended immediate step.