CVE-2025-39723
📋 TL;DR
A Linux kernel vulnerability in the netfs subsystem's unbuffered write error handling can cause kernel NULL pointer dereferences when all subrequests in a write stream fail. This leads to kernel crashes (oops/panics) when applications use splice operations with failing writes. Systems running vulnerable Linux kernel versions with netfs filesystems (like CIFS/SMB) are affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially causing data loss or corruption.
Likely Case
System crash or instability when applications perform splice operations that encounter write failures, particularly with CIFS mounts and cache=none configuration.
If Mitigated
Minor performance impact from the fix's additional checks, with stable system operation.
🎯 Exploit Status
Exploitation requires specific filesystem configuration and application behavior. Found via fuzzing/xfstest rather than real-world attacks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel commits: 387164a2b97e1f5404c6d0049a7409bac7d2bc5b, a3de58b12ce074ec05b8741fa28d62ccb1070468, f08c80af3c9a9849cd178b4843b7c01d103506a1
Vendor Advisory: https://git.kernel.org/stable/c/387164a2b97e1f5404c6d0049a7409bac7d2bc5b
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix. 2. Check distribution security advisories for backported patches. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Avoid cache=none on CIFS mounts
linuxUse default caching or other cache modes on CIFS/SMB mounts to prevent triggering the vulnerability.
mount -t cifs //server/share /mnt -o username=user,password=pass (avoid cache=none option)
Disable splice operations for affected applications
linuxConfigure applications to avoid using splice() system calls with network filesystems.
🧯 If You Can't Patch
- Monitor system logs for 'BUG: kernel NULL pointer dereference' or 'CIFS: VFS: Send error in write = -28' messages
- Implement strict access controls on CIFS mounts and limit splice operations to trusted applications
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if using CIFS with cache=none: 'uname -r' and review /proc/mounts for cache=none options
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commits or check distribution security advisory. Test with generic/750 xfstest.
📡 Detection & Monitoring
Log Indicators:
- CIFS: VFS: Send error in write = -28
- BUG: kernel NULL pointer dereference
- RIP: iter_file_splice_write
- pipe_buf_release errors
Network Indicators:
- Increased CIFS/SMB write errors followed by system instability
SIEM Query:
kernel:('NULL pointer dereference' AND 'iter_file_splice_write') OR cifs:('Send error in write = -28')