CVE-2025-68778
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's btrfs filesystem occurs when a directory is moved from one parent directory to another within the same transaction, and the system attempts to log conflicting inode information. Specifically, the issue arises because the system logs the inode of the moved directory's new location but fails to log the old parent directory. During log replay after a power failure, this causes the directory to appear as if it has two hard links (one from the old parent and one from the new), which is invalid. This results in a mount failure due to the filesystem detecting an inode with an invalid hard link count of 2 for a directory, which should have only one.
How can this vulnerability impact me? :
This vulnerability can cause the btrfs filesystem to fail to mount after a power failure or crash because the filesystem's integrity checks detect an invalid hard link count on a directory inode. This mount failure can lead to system downtime, potential data inaccessibility, and disruption of services relying on the affected filesystem until the issue is resolved or repaired.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking the system logs (dmesg or syslog) for BTRFS errors related to directory inode hard link counts and mount failures. Specifically, look for messages like 'BTRFS critical: corrupt leaf' and 'invalid nlink: has 2 expect no more than 1 for dir'. Commands to check include: `dmesg | grep BTRFS`, `journalctl -k | grep BTRFS`, or `grep BTRFS /var/log/syslog`.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where this BTRFS vulnerability is fixed. Avoid performing operations that move directories and create files with the same name in the same transaction until the fix is applied. Also, ensure regular backups to prevent data loss in case of mount failures due to this issue.