CVE-2025-39791
Linux Kernel vulnerability analysis and mitigation

Overview

A vulnerability in the Linux kernel's dm-crypt subsystem was discovered and documented as CVE-2025-39791. The issue affects the handling of write operations in zoned dm-crypt targets, where BIO splitting operations could lead to potential system issues. This vulnerability was disclosed on September 11, 2025 (NVD).

Technical details

The vulnerability stems from how dm-crypt handles BIO splitting in zoned targets. When processing write operations larger than the dm-crypt internal limits (default 128 KB), the system attempts to split these operations, which can cause two critical issues: 1) potential deadlocks during queue freeze operations due to improper handling of reminder BIOs, and 2) incorrect sector reporting for zone append operations leading to file system data corruptions in xfs or btrfs. The issue specifically affects the write path of dm-crypt when dealing with zoned targets (NVD).

Impact

The vulnerability can result in system deadlocks and file system data corruptions, particularly affecting xfs and btrfs file systems when using zoned dm-crypt targets. The impact is limited to the write path of zoned dm-crypt targets and does not affect regular dm-crypt block devices or the read path operations (NVD).

Mitigation and workarounds

The vulnerability has been addressed through modifications to the getmaxrequestsize() function, which has been renamed to getmaxrequestsectors(). The fix ensures that write BIOs are not split by setting the dm-crypt device maxhwsectors limit to at most BIOMAXVECS << PAGESECTORSSHIFT (1 MB with a 4KB page architecture). This change forces DM core to split write BIOs before they reach crypt_map(), ensuring proper handling without affecting performance (NVD).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40300N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-modules-internal
NoNoSep 11, 2025
CVE-2025-39791N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k
NoNoSep 11, 2025
CVE-2025-39790N/AN/A
  • Linux KernelLinux Kernel
  • kernel-zfcpdump
NoNoSep 11, 2025
CVE-2025-39784N/AN/A
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-modules-partner
NoNoSep 11, 2025
CVE-2025-39782N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-64k
NoNoSep 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management