CVE-2022-49999
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's btrfs filesystem involves a race condition in the space cache management. Specifically, when caching free space for block groups, a race between caching and returning free space to the in-memory space cache can cause double additions of free space ranges. This leads to space cache corruption, including errors like 'unable to add free space :-17', missing free space info, double-accounted space ranges, and potential on-disk corruption or system crashes. The root cause is a concurrency issue introduced by a commit that allowed multiple transactions to unpin extents simultaneously, breaking protections against this race.
How can this vulnerability impact me? :
This vulnerability can cause corruption of the btrfs filesystem's space cache, leading to errors such as double-accounted space ranges and missing free space information. This can result in filesystem inconsistencies, potential data corruption, and system crashes during reboots. In some cases, it may cause the system to hit kernel BUG_ON() checks, leading to kernel panics or instability, which can disrupt system availability and data integrity.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing specific error messages and symptoms related to the btrfs filesystem space cache corruption. Look for errors such as "unable to add free space :-17" (EEXIST), "missing free space info for X", or signs of double-accounted space in the extent and free space trees. Additionally, discrepancies between the in-memory space cache and the free space tree may indicate the issue. While no specific commands are provided, monitoring system logs for these error messages and using debugging tools like drgn to inspect the in-memory space cache can help detect the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
The provided text does not specify immediate mitigation steps for this vulnerability.