CVE-2025-71184

EUVD-2025-206591
In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix NULL dereference on root when tracing inode eviction

When evicting an inode the first thing we do is to setup tracing for it,
which implies fetching the root's id. But in btrfs_evict_inode() the
root might be NULL, as implied in the next check that we do in
btrfs_evict_inode().

Hence, we either should set the ->root_objectid to 0 in case the root is
NULL, or we move tracing setup after checking that the root is not
NULL. Setting the rootid to 0 at least gives us the possibility to trace
this call even in the case when the root is NULL, so that's the solution
taken here.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 4%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
2.6.39.1 ≤
𝑥
< 6.6.130
linuxlinux_kernel
6.7 ≤
𝑥
< 6.12.66
linuxlinux_kernel
6.13 ≤
𝑥
< 6.18.6
linuxlinux_kernel
2.6.39
linuxlinux_kernel
6.19:rc1
linuxlinux_kernel
6.19:rc2
linuxlinux_kernel
6.19:rc3
linuxlinux_kernel
6.19:rc4
linuxlinux_kernel
6.19:rc5
linuxlinux_kernel
6.19:rc6
linuxlinux_kernel
6.19:rc7
linuxlinux_kernel
6.19:rc8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bookworm
vulnerable
bookworm (security)
vulnerable
bullseye
vulnerable
bullseye (security)
vulnerable
forky
7.0.7-1
fixed
sid
7.0.7-1
fixed
trixie
6.12.86-1
fixed
trixie (security)
6.12.88-1
fixed
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
cluster-md-kmp-default
suse enterprise server 12 SP5
4.12.14-122.296.1
fixed
dlm-kmp-default
suse enterprise server 12 SP5
4.12.14-122.296.1
fixed
gfs2-kmp-default
suse enterprise server 12 SP5
4.12.14-122.296.1
fixed
kernel-64kb
suse enterprise desktop 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.34.1
fixed
kernel-default
suse enterprise desktop 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise server 12 SP5
4.12.14-122.296.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.34.1
fixed
kernel-default-base
suse enterprise desktop 15 SP7
6.4.0-150700.53.34.1.150700.17.23.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.34.1.150700.17.23.1
fixed
suse enterprise server 12 SP5
4.12.14-122.296.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.34.1.150700.17.23.1
fixed
kernel-default-man
suse enterprise server 12 SP5
4.12.14-122.296.1
fixed
kernel-docs
suse enterprise desktop 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.34.1
fixed
kernel-macros
suse enterprise desktop 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise server 12 SP5
4.12.14-122.296.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.34.1
fixed
kernel-obs-build
suse enterprise desktop 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.34.1
fixed
kernel-source
suse enterprise desktop 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise server 12 SP5
4.12.14-122.296.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.34.1
fixed
kernel-syms
suse enterprise desktop 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise server 12 SP5
4.12.14-122.296.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.34.1
fixed
kernel-zfcpdump
suse enterprise desktop 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.34.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.34.1
fixed
ocfs2-kmp-default
suse enterprise server 12 SP5
4.12.14-122.296.1
fixed