CVE-2023-54297
Description
In the Linux kernel, the following vulnerability has been resolved:
btrfs: zoned: fix memory leak after finding block group with super blocks
At exclude_super_stripes(), if we happen to find a block group that has super blocks mapped to it and we are on a zoned filesystem, we error out as this is not supposed to happen, indicating either a bug or maybe some memory corruption for example. However we are exiting the function without freeing the memory allocated for the logical address of the super blocks. Fix this by freeing the logical address.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in btrfs zoned mode occurs when a block group with super blocks is unexpectedly found, causing allocated memory to not be freed on error.
In the Linux kernel's btrfs filesystem, a memory leak was discovered in the zoned mode implementation. The function exclude_super_stripes() is responsible for handling block groups that contain super block stripes on zoned devices. In certain bug or memory corruption scenarios, a block group may unexpectedly have super blocks mapped to it. When this occurs, the function correctly errors out, but it fails to free the memory that was allocated to store the logical address of those super blocks [1]. This oversight leads to a memory leak.
To exploit this vulnerability, an attacker would need local access and the ability to trigger the specific condition where a block group with super blocks is encountered on a zoned btrfs filesystem. This could be achieved through crafted operations that corrupt metadata or trigger a kernel bug, potentially requiring elevated privileges to initiate filesystem actions that lead to the error path.
The impact is primarily a memory leak, which can degrade system performance over time as available memory is consumed. In systems with limited memory or under continuous attack, this could lead to denial-of-service conditions. There is no evidence of privilege escalation or data corruption from this leak alone.
The fix was applied in the Linux kernel stable tree via commit c35ea6061962 [1]. System administrators should apply the latest kernel updates from their distribution to address this vulnerability. No known workarounds exist other than avoiding the use of btrfs in zoned mode or ensuring the kernel is patched.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
4ab80a901f8dac35ea6061962cca627afb463f1a07c2b4e2cVulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.