{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-53618","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-10-07T15:16:59.655Z","datePublished":"2025-10-07T15:19:25.303Z","dateUpdated":"2026-05-11T19:48:38.481Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:48:38.481Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: reject invalid reloc tree root keys with stack dump\n\n[BUG]\nSyzbot reported a crash that an ASSERT() got triggered inside\nprepare_to_merge().\n\nThat ASSERT() makes sure the reloc tree is properly pointed back by its\nsubvolume tree.\n\n[CAUSE]\nAfter more debugging output, it turns out we had an invalid reloc tree:\n\n  BTRFS error (device loop1): reloc tree mismatch, root 8 has no reloc root, expect reloc root key (-8, 132, 8) gen 17\n\nNote the above root key is (TREE_RELOC_OBJECTID, ROOT_ITEM,\nQUOTA_TREE_OBJECTID), meaning it's a reloc tree for quota tree.\n\nBut reloc trees can only exist for subvolumes, as for non-subvolume\ntrees, we just COW the involved tree block, no need to create a reloc\ntree since those tree blocks won't be shared with other trees.\n\nOnly subvolumes tree can share tree blocks with other trees (thus they\nhave BTRFS_ROOT_SHAREABLE flag).\n\nThus this new debug output proves my previous assumption that corrupted\non-disk data can trigger that ASSERT().\n\n[FIX]\nBesides the dedicated fix and the graceful exit, also let tree-checker to\ncheck such root keys, to make sure reloc trees can only exist for subvolumes."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/btrfs/disk-io.c","fs/btrfs/tree-checker.c"],"versions":[{"version":"259ee7754b6793af8bdd77f9ca818bc41cfe9541","lessThan":"314135b7bae9618a317874ae195272682cf2d5d4","status":"affected","versionType":"git"},{"version":"259ee7754b6793af8bdd77f9ca818bc41cfe9541","lessThan":"3ae93b316ca4b8b3c33798ef1d210355f2fb9318","status":"affected","versionType":"git"},{"version":"259ee7754b6793af8bdd77f9ca818bc41cfe9541","lessThan":"84256e00eeca73c529fc6196e478cc89b8098157","status":"affected","versionType":"git"},{"version":"259ee7754b6793af8bdd77f9ca818bc41cfe9541","lessThan":"6ebcd021c92b8e4b904552e4d87283032100796d","status":"affected","versionType":"git"},{"version":"3d95c52d789ca99e344061d7f6dadb2519adbcf5","status":"affected","versionType":"git"},{"version":"fba904d68c8bbfcc89c2210cfcb2351be90bc3e5","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/btrfs/disk-io.c","fs/btrfs/tree-checker.c"],"versions":[{"version":"5.4","status":"affected"},{"version":"0","lessThan":"5.4","status":"unaffected","versionType":"semver"},{"version":"5.15.127","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.46","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.4.11","lessThanOrEqual":"6.4.*","status":"unaffected","versionType":"semver"},{"version":"6.5","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"5.15.127"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"6.1.46"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"6.4.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"6.5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2.19"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3.4"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/314135b7bae9618a317874ae195272682cf2d5d4"},{"url":"https://git.kernel.org/stable/c/3ae93b316ca4b8b3c33798ef1d210355f2fb9318"},{"url":"https://git.kernel.org/stable/c/84256e00eeca73c529fc6196e478cc89b8098157"},{"url":"https://git.kernel.org/stable/c/6ebcd021c92b8e4b904552e4d87283032100796d"}],"title":"btrfs: reject invalid reloc tree root keys with stack dump","x_generator":{"engine":"bippy-1.2.0"}}}}