Home

Description

In the Linux kernel, the following vulnerability has been resolved: btrfs: do not BUG_ON() on ENOMEM when dropping extent items for a range If we get -ENOMEM while dropping file extent items in a given range, at btrfs_drop_extents(), due to failure to allocate memory when attempting to increment the reference count for an extent or drop the reference count, we handle it with a BUG_ON(). This is excessive, instead we can simply abort the transaction and return the error to the caller. In fact most callers of btrfs_drop_extents(), directly or indirectly, already abort the transaction if btrfs_drop_extents() returns any error. Also, we already have error paths at btrfs_drop_extents() that may return -ENOMEM and in those cases we abort the transaction, like for example anything that changes the b+tree may return -ENOMEM due to a failure to allocate a new extent buffer when COWing an existing extent buffer, such as a call to btrfs_duplicate_item() for example. So replace the BUG_ON() calls with proper logic to abort the transaction and return the error.

PUBLISHED Reserved 2025-09-15 | Published 2025-09-15 | Updated 2025-09-15 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 50f993da945074b2a069da099a0331b23a0c89a0
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 7fbcb635c8fc927d139f3302babcf1b42c09265c
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 1baf3370e2dc5e6bd1368348736189457dab2a27
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 162d053e15fe985f754ef495a96eb3db970c43ed
affected

Default status
affected

5.15.86 (semver)
unaffected

6.0.16 (semver)
unaffected

6.1.2 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/50f993da945074b2a069da099a0331b23a0c89a0

git.kernel.org/...c/7fbcb635c8fc927d139f3302babcf1b42c09265c

git.kernel.org/...c/1baf3370e2dc5e6bd1368348736189457dab2a27

git.kernel.org/...c/162d053e15fe985f754ef495a96eb3db970c43ed

cve.org (CVE-2022-50293)

nvd.nist.gov (CVE-2022-50293)

Download JSON