Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2022-49168
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-26 Feb, 2025 | 01:55
Updated At-19 Jan, 2026 | 12:17
Rejected At-
▼CVE Numbering Authority (CNA)
btrfs: do not clean up repair bio if submit fails

In the Linux kernel, the following vulnerability has been resolved: btrfs: do not clean up repair bio if submit fails The submit helper will always run bio_endio() on the bio if it fails to submit, so cleaning up the bio just leads to a variety of use-after-free and NULL pointer dereference bugs because we race with the endio function that is cleaning up the bio. Instead just return BLK_STS_OK as the repair function has to continue to process the rest of the pages, and the endio for the repair bio will do the appropriate cleanup for the page that it was given.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/btrfs/extent_io.c
Default Status
unaffected
Versions
Affected
  • From 6c387ab20db15f2bd448f7c508e2638101b16ea1 before e7e1d15d2bd8c373cf621614ddd17971a2132713 (git)
  • From 6c387ab20db15f2bd448f7c508e2638101b16ea1 before 7170875083254b51fcc5d67f96640977083f481e (git)
  • From 6c387ab20db15f2bd448f7c508e2638101b16ea1 before e76c78c48902dae6fa612749f59162bca0a79e0b (git)
  • From 6c387ab20db15f2bd448f7c508e2638101b16ea1 before d1cb11fb45ebbb1e7dfe5e9038b32ea72c184b14 (git)
  • From 6c387ab20db15f2bd448f7c508e2638101b16ea1 before 8cbc3001a3264d998d6b6db3e23f935c158abd4d (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/btrfs/extent_io.c
Default Status
affected
Versions
Affected
  • 3.18
Unaffected
  • From 0 before 3.18 (semver)
  • From 5.10.248 through 5.10.* (semver)
  • From 5.15.184 through 5.15.* (semver)
  • From 5.16.19 through 5.16.* (semver)
  • From 5.17.2 through 5.17.* (semver)
  • From 5.18 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/e7e1d15d2bd8c373cf621614ddd17971a2132713
N/A
https://git.kernel.org/stable/c/7170875083254b51fcc5d67f96640977083f481e
N/A
https://git.kernel.org/stable/c/e76c78c48902dae6fa612749f59162bca0a79e0b
N/A
https://git.kernel.org/stable/c/d1cb11fb45ebbb1e7dfe5e9038b32ea72c184b14
N/A
https://git.kernel.org/stable/c/8cbc3001a3264d998d6b6db3e23f935c158abd4d
N/A
Hyperlink: https://git.kernel.org/stable/c/e7e1d15d2bd8c373cf621614ddd17971a2132713
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7170875083254b51fcc5d67f96640977083f481e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e76c78c48902dae6fa612749f59162bca0a79e0b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d1cb11fb45ebbb1e7dfe5e9038b32ea72c184b14
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/8cbc3001a3264d998d6b6db3e23f935c158abd4d
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-416CWE-416 Use After Free
Type: CWE
CWE ID: CWE-416
Description: CWE-416 Use After Free
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found