Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-71269

Опубликовано: 18 мар. 2026
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

A resource accounting flaw was found in the Linux kernel's btrfs filesystem. When creating an inline extent fails with -ENOSPC, the code falls back to the normal COW (copy-on-write) path. However, it incorrectly frees the reserved qgroup data even though the data will still be written via the fallback path. This causes qgroup accounting to become inconsistent, potentially allowing data writes to exceed quota limits.

Отчет

This flaw affects btrfs filesystems using qgroups for quota management. The incorrect qgroup reservation handling occurs in an error recovery path when inline extent creation fails due to space pressure. While this can cause quota accounting inconsistencies, it requires specific conditions (qgroups enabled, ENOSPC during inline extent creation) and does not directly lead to code execution or data corruption.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelFix deferred
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelFix deferred
Red Hat Enterprise Linux 7kernel-rtFix deferred
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-832
https://bugzilla.redhat.com/show_bug.cgi?id=2448690kernel: btrfs: do not free data reservation in fallback from inline due to -ENOSPC

EPSS

Процентиль: 6%
0.00024
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

ubuntu
10 дней назад

In the Linux kernel, the following vulnerability has been resolved: btrfs: do not free data reservation in fallback from inline due to -ENOSPC If we fail to create an inline extent due to -ENOSPC, we will attempt to go through the normal COW path, reserve an extent, create an ordered extent, etc. However we were always freeing the reserved qgroup data, which is wrong since we will use data. Fix this by freeing the reserved qgroup data in __cow_file_range_inline() only if we are not doing the fallback (ret is <= 0).

nvd
11 дней назад

In the Linux kernel, the following vulnerability has been resolved: btrfs: do not free data reservation in fallback from inline due to -ENOSPC If we fail to create an inline extent due to -ENOSPC, we will attempt to go through the normal COW path, reserve an extent, create an ordered extent, etc. However we were always freeing the reserved qgroup data, which is wrong since we will use data. Fix this by freeing the reserved qgroup data in __cow_file_range_inline() only if we are not doing the fallback (ret is <= 0).

msrc
9 дней назад

btrfs: do not free data reservation in fallback from inline due to -ENOSPC

debian
11 дней назад

In the Linux kernel, the following vulnerability has been resolved: b ...

github
11 дней назад

In the Linux kernel, the following vulnerability has been resolved: btrfs: do not free data reservation in fallback from inline due to -ENOSPC If we fail to create an inline extent due to -ENOSPC, we will attempt to go through the normal COW path, reserve an extent, create an ordered extent, etc. However we were always freeing the reserved qgroup data, which is wrong since we will use data. Fix this by freeing the reserved qgroup data in __cow_file_range_inline() only if we are not doing the fallback (ret is <= 0).

EPSS

Процентиль: 6%
0.00024
Низкий

5.5 Medium

CVSS3