CVE-2025-40209
BaseFortify
Publication date: 2025-11-21
Last updated on: 2025-11-21
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's btrfs filesystem code. Specifically, when the function btrfs_add_qgroup_relation() is called with invalid qgroup levels (where the source level is greater than or equal to the destination level), it returns an error (-EINVAL) without freeing a preallocated memory structure called qgroup_list. Because the caller then sets the pointer to NULL unconditionally, the allocated memory is never freed, causing a memory leak. This leak occurs repeatedly if triggered multiple times, potentially exhausting kernel memory.
How can this vulnerability impact me? :
This vulnerability can lead to a memory leak in the Linux kernel, which can be exploited by an unprivileged user with access to a writable btrfs mount. By repeatedly triggering the invalid qgroup level condition, the attacker can cause the kernel to leak memory continuously, potentially exhausting kernel memory resources. This could degrade system performance or lead to denial of service due to resource exhaustion.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the memory leak in btrfs_add_qgroup_relation() has been fixed. This fix ensures that the preallocated qgroup_list structure is properly freed on all error paths, preventing memory leaks. Until the update is applied, restrict unprivileged users' access to writable btrfs mounts to prevent exploitation.