CVE-2025-38370
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's btrfs filesystem when rebuilding the free space tree. During the rebuild, if multiple transactions are used and new metadata block groups are allocated, the process may attempt to add block groups that already exist in the free space tree. This causes a failure with an error (-EEXIST), aborting the transaction and potentially causing instability or failure in the filesystem operations related to free space management.
How can this vulnerability impact me? :
The vulnerability can cause transactions related to the free space tree rebuild in the btrfs filesystem to abort unexpectedly. This may lead to filesystem instability, failed mount or remount operations, and potential disruption of normal filesystem usage, which could affect system reliability and data availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for specific error messages related to the btrfs free space tree rebuild failure. Look for kernel warnings or errors containing 'BTRFS: Transaction aborted (error -17)' and traces involving btrfs_rebuild_free_space_tree. Checking dmesg or journalctl logs for these messages can help identify the issue. Example commands to detect this include: 'dmesg | grep -i btrfs' or 'journalctl -k | grep -i btrfs'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this btrfs free space tree rebuild issue is fixed. Since the vulnerability is resolved in the kernel, applying the latest kernel patches or upgrading to a fixed kernel release will prevent the problem. Additionally, avoid performing operations that trigger free space tree rebuilds on affected kernel versions until patched.