CVE-2025-38223

5.5 MEDIUM

📋 TL;DR

A kernel bug in the Linux Ceph filesystem driver triggers a BUG_ON assertion failure when handling encrypted inodes with unaligned file sizes (e.g., 33KB or 1KB). This causes a kernel panic and system crash, affecting systems using Ceph with filesystem encryption.

💻 Affected Systems

Products:
  • Linux kernel Ceph filesystem driver
Versions: Linux kernel versions before fixes in stable commits 060909278cc0a91373a20726bd3d8ce085f480a9, 26725a76264b97d1ff104031b78da57f47741625, 75583606aeef357a524cf6afd07f4b653ae48964
Operating Systems: Linux distributions using affected kernel versions with Ceph support
Default Config Vulnerable: ✅ No
Notes: Only affects systems with Ceph filesystem mounted and using filesystem encryption (fscrypt) with unaligned file sizes.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data corruption or loss in active filesystem operations.

🟠

Likely Case

System crash when accessing encrypted files with unaligned sizes on Ceph filesystems, resulting in downtime.

🟢

If Mitigated

No impact if Ceph is not used or encryption is disabled on affected filesystems.

🌐 Internet-Facing: LOW - Requires local filesystem access; not directly network-exploitable.
🏢 Internal Only: MEDIUM - Can be triggered by any user or process accessing affected encrypted files on Ceph filesystems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW - Can be triggered by creating or accessing encrypted files with specific unaligned sizes.

Triggered by normal filesystem operations; not a remote exploit. The generic/397 test case demonstrates the issue.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with fixes from the referenced stable commits

Vendor Advisory: https://git.kernel.org/stable/c/060909278cc0a91373a20726bd3d8ce085f480a9

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fixes. 2. For distributions: Use package manager (apt/yum/dnf) to install latest kernel. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable filesystem encryption on Ceph

linux

Avoid using fscrypt encryption on Ceph filesystems to prevent trigger conditions.

Do not set encryption policies on Ceph filesystems: 'sudo fscrypt status' to check, avoid 'fscrypt encrypt' commands.

Avoid unaligned file sizes

linux

Ensure encrypted files on Ceph are aligned to filesystem block sizes.

Use tools that create aligned files or manually check sizes.

🧯 If You Can't Patch

  • Monitor for kernel panic logs related to Ceph and encrypted inodes.
  • Restrict user access to Ceph filesystems or implement strict file size policies.

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if Ceph is used with encryption: 'uname -r' and 'mount | grep ceph', then test with generic/397 fstest if available.

Check Version:

uname -r

Verify Fix Applied:

After update, verify kernel version includes fixes and test encrypted file operations on Ceph.

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs with 'kernel BUG at net/ceph/messenger.c:1070' or similar BUG_ON messages related to Ceph and encryption.

Network Indicators:

  • None - local filesystem issue.

SIEM Query:

source="kernel" AND "BUG" AND "ceph" AND "encrypt"

🔗 References

📤 Share & Export