Bug 2363508 (CVE-2022-49913) - CVE-2022-49913 kernel: btrfs: fix inode list leak during backref walking at find_parent_nodes()
Summary: CVE-2022-49913 kernel: btrfs: fix inode list leak during backref walking at f...
Keywords:
Status: NEW
Alias: CVE-2022-49913
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-01 15:07 UTC by OSIDB Bzimport
Modified: 2025-05-02 03:40 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-05-01 15:07:30 UTC
In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix inode list leak during backref walking at find_parent_nodes()

During backref walking, at find_parent_nodes(), if we are dealing with a
data extent and we get an error while resolving the indirect backrefs, at
resolve_indirect_refs(), or in the while loop that iterates over the refs
in the direct refs rbtree, we end up leaking the inode lists attached to
the direct refs we have in the direct refs rbtree that were not yet added
to the refs ulist passed as argument to find_parent_nodes(). Since they
were not yet added to the refs ulist and prelim_release() does not free
the lists, on error the caller can only free the lists attached to the
refs that were added to the refs ulist, all the remaining refs get their
inode lists never freed, therefore leaking their memory.

Fix this by having prelim_release() always free any attached inode list
to each ref found in the rbtree, and have find_parent_nodes() set the
ref's inode list to NULL once it transfers ownership of the inode list
to a ref added to the refs ulist passed to find_parent_nodes().

Comment 1 Avinash Hanwate 2025-05-02 03:36:56 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025050106-CVE-2022-49913-d909@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.