{"id":"CVE-2023-54185","summary":"btrfs: remove BUG_ON()'s in add_new_free_space()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: remove BUG_ON()'s in add_new_free_space()\n\nAt add_new_free_space() we have these BUG_ON()'s that are there to deal\nwith any failure to add free space to the in memory free space cache.\nSuch failures are mostly -ENOMEM that should be very rare. However there's\nno need to have these BUG_ON()'s, we can just return any error to the\ncaller and all callers and their upper call chain are already dealing with\nerrors.\n\nSo just make add_new_free_space() return any errors, while removing the\nBUG_ON()'s, and returning the total amount of added free space to an\noptional u64 pointer argument.","modified":"2026-03-31T17:29:24.102915154Z","published":"2025-12-30T12:08:55.218Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54185.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/23e72231f8281505883514b23709076e234d4f27"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d8ccbd21918fd7fa6ce3226cffc22c444228e8ad"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f775ceb0cb530e4a469b718fb2a24843071087f5"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54185.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54185"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0f9dd46cda36b8de3b9f48bc42bd09d20b9c3b52"},{"fixed":"23e72231f8281505883514b23709076e234d4f27"},{"fixed":"f775ceb0cb530e4a469b718fb2a24843071087f5"},{"fixed":"d8ccbd21918fd7fa6ce3226cffc22c444228e8ad"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54185.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.29"},{"fixed":"6.1.45"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.10"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54185.json"}}],"schema_version":"1.7.5"}