CVE-2022-50293
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 5.15.86 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.0.16 (exc) |
| linux | linux_kernel | From 6.1 (inc) to 6.1.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-617 | The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's btrfs filesystem code. When the system tries to drop file extent items in a range and encounters a memory allocation failure (-ENOMEM), the code previously used a BUG_ON() call, which causes a kernel panic or crash. This behavior is excessive. The fix replaces the BUG_ON() with proper error handling that aborts the transaction and returns the error to the caller, preventing a kernel crash and allowing the system to handle the error gracefully.
How can this vulnerability impact me? :
If triggered, this vulnerability could cause the Linux kernel to crash due to the BUG_ON() call when memory allocation fails during certain btrfs operations. This could lead to system instability or downtime. The fix prevents such crashes by properly handling the error, improving system reliability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the fix has been applied. The fix replaces the BUG_ON() call on ENOMEM errors in btrfs_drop_extents() with proper error handling that aborts the transaction instead of causing a kernel BUG. Applying the updated kernel will prevent the system from crashing due to this issue.