CVE-2025-40100
BaseFortify
Publication date: 2025-10-30
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| anubis | anubis | 1.22.0 |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's Btrfs filesystem code. It occurs because the code incorrectly assumes that a block group item will always be found when building the free space tree, even when the block group tree feature is not enabled. However, a new block group can be created in the current transaction that is still empty and has not yet had its block group item added to the extent tree. This incorrect assumption leads to an assertion failure and a kernel bug, causing a crash or system instability.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash or become unstable due to an assertion failure in the Btrfs filesystem code. This can lead to system downtime, potential data loss, or corruption if the filesystem is in use when the bug triggers.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for kernel BUGs or oops messages related to BTRFS free space tree rebuilding failures. Specifically, look for logs containing assertion failures in fs/btrfs/free-space-tree.c around line 1115, or messages mentioning 'rebuilding free space tree' and 'assertion failed: ret == 0'. Checking the kernel logs with commands like 'dmesg | grep -i btrfs' or 'journalctl -k | grep -i btrfs' can help identify such issues.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is resolved. Since the issue is fixed by removing the incorrect assertion in the free space tree code, applying the latest kernel patches or upgrading to a kernel version released after 2025-10-30 will mitigate the problem. Additionally, avoid operations that trigger rebuilding the free space tree on affected systems until patched.