CVE-2025-38276

5.5 MEDIUM

📋 TL;DR

A race condition vulnerability in the Linux kernel's DAX (Direct Access) filesystem implementation can cause system instability or crashes when performing truncate operations on XFS filesystems with DAX enabled. The bug occurs when waiting for locked entries during scanning, causing entries to be skipped and leading to inconsistent state. This affects systems using XFS with DAX enabled.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions containing commit 6be3e21d25ca up to fixes in stable releases
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when XFS filesystem is configured with DAX (Direct Access) enabled. Requires specific filesystem operations like truncate.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

System crash or kernel panic leading to denial of service and potential data corruption on affected filesystems.

🟠

Likely Case

Intermittent system instability, kernel warnings, and potential filesystem corruption during truncate operations on DAX-enabled XFS.

🟢

If Mitigated

Minor performance impact or occasional warnings in kernel logs without system compromise.

🌐 Internet-Facing: LOW - This is a local filesystem vulnerability requiring local access or specific filesystem operations.
🏢 Internal Only: MEDIUM - Internal users or processes performing truncate operations on DAX-enabled XFS could trigger system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires specific filesystem operations on DAX-enabled XFS. More likely to cause instability than privilege escalation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in stable kernel releases via commits 61009dd2252ab4391d44a240e891f1e04c00b9ca and dd59137bfe70cf3646021b4721e430213b9c71bd

Vendor Advisory: https://git.kernel.org/stable/c/61009dd2252ab4391d44a240e891f1e04c00b9ca

Restart Required: Yes

Instructions:

1. Update to a kernel version containing the fix. 2. Check your distribution's security advisories. 3. Reboot to load the new kernel.

🔧 Temporary Workarounds

Disable DAX on XFS filesystems

linux

Disable Direct Access (DAX) feature on XFS filesystems to avoid the vulnerable code path

mount -o remount,nodax /mount/point
Add 'nodax' to /etc/fstab mount options for XFS partitions

🧯 If You Can't Patch

  • Avoid truncate operations on DAX-enabled XFS filesystems
  • Monitor system logs for the specific warning messages and restart affected services if warnings appear

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if XFS with DAX is in use: uname -r and check /proc/mounts for XFS with 'dax' option

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is newer than affected range and test with xfstests generic/068 on DAX-enabled XFS

📡 Detection & Monitoring

Log Indicators:

  • Kernel warnings containing 'truncate_folio_batch_exceptionals' or similar stack traces
  • System logs showing filesystem errors on XFS with DAX

Network Indicators:

  • None - this is a local filesystem issue

SIEM Query:

kernel_warning:"truncate_folio_batch_exceptionals" OR filesystem_error:"XFS" AND "DAX"

🔗 References

📤 Share & Export