CVE-2025-39738
BaseFortify
Publication date: 2025-09-11
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Btrfs filesystem in the Linux kernel, where relocation of partially dropped subvolumes is not allowed. The issue arises because some subvolumes that were only partially dropped (deleted) can cause balance operations to abort transactions due to missing backreferences in the extent tree. This happens because the subvolume is in a half-dropped state without an orphan item, leading to inconsistencies during relocation. The problem was fixed by ensuring that half-dropped subvolumes are rejected early during relocation, preventing transaction aborts and debugging difficulties.
How can this vulnerability impact me? :
This vulnerability can cause balance operations on Btrfs filesystems to abort transactions unexpectedly, potentially leading to filesystem operation failures or instability. It may result in delays or failures during filesystem maintenance tasks like relocation or cleanup of subvolumes, which could impact system reliability or data availability until the issue is resolved.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability relates to the btrfs filesystem and involves partially dropped subvolumes causing transaction aborts during balance operations. Detection involves monitoring for BTRFS errors such as 'extent item not found for insert' and 'Transaction aborted' messages in system logs. Running 'btrfs check' may not report issues related to this problem. Specific commands to detect this include checking kernel logs (e.g., 'dmesg | grep BTRFS') for error messages and inspecting subvolumes for half-dropped states. However, no explicit detection commands are provided in the available information.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves ensuring your system is running a Linux kernel version that includes the upstream fix (commit 8d488a8c7ba2) which prevents subvolume/snapshot deletion issues on mount. Avoid running balance operations on filesystems with half-dropped subvolumes. Mount the filesystem read-write to trigger orphan subvolume cleanup. For older filesystems, use updated btrfs-progs tools that include enhancements to repair such issues. Rejecting half-dropped subvolumes early during relocation is part of the fix to prevent transaction aborts.