CVE-2025-38269

In the Linux kernel, the following vulnerability has been resolved: btrfs: exit after state insertion failure at btrfs_convert_extent_bit() If insert_state() state failed it returns an error pointer and we call extent_io_tree_panic() which will trigger a BUG() call. However if CONFIG_BUG is disabled, which is an uncommon and exotic scenario, then we fallthrough and call cache_state() which will dereference the error pointer, resulting in an invalid memory access. So jump to the 'out' label after calling extent_io_tree_panic(), it also makes the code more clear besides dealing with the exotic scenario where CONFIG_BUG is disabled.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

20 Nov 2025, 16:39

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/3bf179e36da917c5d9bec71c714573ed1649b7c1 - () https://git.kernel.org/stable/c/3bf179e36da917c5d9bec71c714573ed1649b7c1 - Patch
References () https://git.kernel.org/stable/c/58c50f45e1821a04d61b62514f9bd34afe67c622 - () https://git.kernel.org/stable/c/58c50f45e1821a04d61b62514f9bd34afe67c622 - Patch
References () https://git.kernel.org/stable/c/8d9d32088e304e2bc444a3087cab0bbbd9951866 - () https://git.kernel.org/stable/c/8d9d32088e304e2bc444a3087cab0bbbd9951866 - Patch
First Time Linux linux Kernel
Linux
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

Information

Published : 2025-07-10 08:15

Updated : 2025-11-20 16:39


NVD link : CVE-2025-38269

Mitre link : CVE-2025-38269

CVE.ORG link : CVE-2025-38269


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference