CVE-2025-38503
BaseFortify
Publication date: 2025-08-16
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's btrfs filesystem when the block group tree feature is enabled. During the building of the free space tree, an assertion failure can happen if an empty block group (one with no allocated extents or items) is processed. This leads to a kernel BUG and system crash because the code incorrectly expects to find a block group item in the extent root, which does not exist for empty block groups with the block group tree feature enabled. The fix involves adjusting the assertion logic to handle this case properly by allowing the addition of a free space record spanning the whole block group when no block group item is found.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel BUG) when mounting or remounting a btrfs filesystem with the block group tree feature enabled and an empty block group is encountered. This can lead to system instability, potential data unavailability, and disruption of services relying on the affected filesystem.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as an assertion failure and kernel BUG related to the btrfs free space tree when the block group tree feature is enabled. Detection involves monitoring system logs for messages similar to the following kernel error: 'assertion failed: ret == 0, in fs/btrfs/free-space-tree.c:1102' or 'kernel BUG at fs/btrfs/free-space-tree.c:1102!'. You can check the kernel logs using commands like 'dmesg | grep btrfs' or 'journalctl -k | grep btrfs' to find such assertion failures or BUG messages related to btrfs free space tree rebuilding.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by a code change in the btrfs filesystem code. Until an update is applied, avoid operations that trigger rebuilding the free space tree with the block group tree feature enabled, such as remounting btrfs filesystems with read-write mode or reconfiguring the superblock. Monitoring for the assertion failure and avoiding triggering the condition can help reduce risk.