btrfs: do not free data reservation in fallback from inline due to -ENOSPC
Summary
| CVE | CVE-2025-71269 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-18 18:16:22 UTC |
| Updated | 2026-04-11 13:16:36 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
btrfs: do not free data reservation in fallback from inline due to -ENOSPC
If we fail to create an inline extent due to -ENOSPC, we will attempt to
go through the normal COW path, reserve an extent, create an ordered
extent, etc. However we were always freeing the reserved qgroup data,
which is wrong since we will use data. Fix this by freeing the reserved
qgroup data in __cow_file_range_inline() only if we are not doing the
fallback (ret is <= 0). |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 94ed938aba557aa798acf496f09afb289b619fcd 3edd1f6c7c520536b62b2904807033597554dbac git |
Not specified |
| CNA |
Linux |
Linux |
affected 94ed938aba557aa798acf496f09afb289b619fcd 3a9fd45afadec1fbfec72057b9473d509fa8b68c git |
Not specified |
| CNA |
Linux |
Linux |
affected 94ed938aba557aa798acf496f09afb289b619fcd 0a1fbbd780f04d1b6cf48dd327c866ba937de1c4 git |
Not specified |
| CNA |
Linux |
Linux |
affected 94ed938aba557aa798acf496f09afb289b619fcd 6de3a371a8b9fd095198b1aa68c22cc10a4c6961 git |
Not specified |
| CNA |
Linux |
Linux |
affected 94ed938aba557aa798acf496f09afb289b619fcd f8da41de0bff9eb1d774a7253da0c9f637c4470a git |
Not specified |
| CNA |
Linux |
Linux |
affected 4.4 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 4.4 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.168 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.134 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.81 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.10 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/f8da41de0bff9eb1d774a7253da0c9f637c4470a |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/3a9fd45afadec1fbfec72057b9473d509fa8b68c |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/0a1fbbd780f04d1b6cf48dd327c866ba937de1c4 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/6de3a371a8b9fd095198b1aa68c22cc10a4c6961 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/3edd1f6c7c520536b62b2904807033597554dbac |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.