CVE-2025-39738
Description
In the Linux kernel, the following vulnerability has been resolved:
btrfs: do not allow relocation of partially dropped subvolumes
[BUG] There is an internal report that balance triggered transaction abort, with the following call trace:
item 85 key (594509824 169 0) itemoff 12599 itemsize 33 extent refs 1 gen 197740 flags 2 ref#0: tree block backref root 7 item 86 key (594558976 169 0) itemoff 12566 itemsize 33 extent refs 1 gen 197522 flags 2 ref#0: tree block backref root 7 ... BTRFS error (device loop0): extent item not found for insert, bytenr 594526208 num_bytes 16384 parent 449921024 root_objectid 934 owner 1 offset 0 BTRFS error (device loop0): failed to run delayed ref for logical 594526208 num_bytes 16384 type 182 action 1 ref_mod 1: -117 ------------[ cut here ]------------ BTRFS: Transaction aborted (error -117) WARNING: CPU: 1 PID: 6963 at ../fs/btrfs/extent-tree.c:2168 btrfs_run_delayed_refs+0xfa/0x110 [btrfs]
And btrfs check doesn't report anything wrong related to the extent tree.
[CAUSE] The cause is a little complex, firstly the extent tree indeed doesn't have the backref for 594526208.
The extent tree only have the following two backrefs around that bytenr on-disk:
item 65 key (594509824 METADATA_ITEM 0) itemoff 13880 itemsize 33 refs 1 gen 197740 flags TREE_BLOCK tree block skinny level 0 (176 0x7) tree block backref root CSUM_TREE item 66 key (594558976 METADATA_ITEM 0) itemoff 13847 itemsize 33 refs 1 gen 197522 flags TREE_BLOCK tree block skinny level 0 (176 0x7) tree block backref root CSUM_TREE
But the such missing backref item is not an corruption on disk, as the offending delayed ref belongs to subvolume 934, and that subvolume is being dropped:
item 0 key (934 ROOT_ITEM 198229) itemoff 15844 itemsize 439 generation 198229 root_dirid 256 bytenr 10741039104 byte_limit 0 bytes_used 345571328 last_snapshot 198229 flags 0x1000000000001(RDONLY) refs 0 drop_progress key (206324 EXTENT_DATA 2711650304) drop_level 2 level 2 generation_v2 198229
And that offending tree block 594526208 is inside the dropped range of that subvolume. That explains why there is no backref item for that bytenr and why btrfs check is not reporting anything wrong.
But this also shows another problem, as btrfs will do all the orphan subvolume cleanup at a read-write mount.
So half-dropped subvolume should not exist after an RW mount, and balance itself is also exclusive to subvolume cleanup, meaning we shouldn't hit a subvolume half-dropped during relocation.
The root cause is, there is no orphan item for this subvolume. In fact there are 5 subvolumes from around 2021 that have the same problem.
It looks like the original report has some older kernels running, and caused those zombie subvolumes.
Thankfully upstream commit 8d488a8c7ba2 ("btrfs: fix subvolume/snapshot deletion not triggered on mount") has long fixed the bug.
[ENHANCEMENT] For repairing such old fs, btrfs-progs will be enhanced.
Considering how delayed the problem will show up (at run delayed ref time) and at that time we have to abort transaction already, it is too late.
Instead here we reject any half-dropped subvolume for reloc tree at the earliest time, preventing confusion and extra time wasted on debugging similar bugs.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A flaw in the Linux kernel's btrfs filesystem allows relocation of partially dropped subvolumes, leading to a transaction abort and potential system instability.
Vulnerability
Description
CVE-2025-39738 is a vulnerability in the Linux kernel's btrfs filesystem. The root cause is that the relocation code does not properly does not check if a subvolume is in the process of being dropped (partially dropped). When a balance operation is triggered on a subvolume that has not completed its drop operation, the relocation code can attempt to insert extent back references that are already missing because the subvolume's tree blocks are being removed. This leads to a transaction abort with error -117 (EUCLEAN), as seen in the internal report [1].
Exploitation
An attacker with local access and the ability to trigger a btrfs balance operation on a filesystem containing a partially dropped subvolume can exploit this vulnerability. The attack does not require special privileges beyond those needed to run the balance command. The prerequisite is that a subvolume drop operation has been initiated but not completed, which can happen during normal filesystem operations or through administrative actions [1].## Impact
Successful exploitation results in a transaction abort, which can cause the filesystem to become read-only or lead to a kernel panic, depending on the configuration. This can lead to denial of service (DoS) and potential data loss if the filesystem is not properly recovered. The vulnerability is rated High with a CVSS v3 score of 7.8, indicating significant impact on availability [1].## Mitigation
The fix has been implemented in the Linux kernel stable tree. Patches are available in commits [2], [3], and [4]. Users should update their kernel to a version that includes the fix. The patch prevents relocation from proceeding on partially dropped subvolumes, thereby avoiding the transaction abort.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
11- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 7 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=5.11.1,<5.15.190
- cpe:2.3:o:linux:linux_kernel:5.11:-:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.11:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.11:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.11:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.11:rc7:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
- Linux/Linuxv5Range: 5.11
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- git.kernel.org/stable/c/125e94a4b76b7b75d194f85bedd628097d2121f0nvdPatch
- git.kernel.org/stable/c/39a93e1c9dbf7e11632efeb20fcf0fc1dcf64d51nvdPatch
- git.kernel.org/stable/c/4289b494ac553e74e86fed1c66b2bf9530bc1082nvdPatch
- git.kernel.org/stable/c/4e403bd8e127d40dc7c05f06ee969c1ba1537ec5nvdPatch
- git.kernel.org/stable/c/f83d4c81bda3b7d1813268ab77408f7a0ce691ffnvdPatch
- git.kernel.org/stable/c/fa086b1398cf7e5f7dee7241bd5f2855cb5df8dcnvdPatch
- git.kernel.org/stable/c/fcb1f77b8ed8795608ca7a1f6505e2b07236c1f3nvdPatch
- lists.debian.org/debian-lts-announce/2025/10/msg00008.htmlnvdMailing ListThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-032379.htmlnvd
News mentions
1- Siemens SIMATICCISA ICS Advisories