CVE-2022-50300

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix extent map use-after-free when handling missing device in read_one_chunk Store the error code before freeing the extent_map. Though it's reference counted structure, in that function it's the first and last allocation so this would lead to a potential use-after-free. The error can happen eg. when chunk is stored on a missing device and the degraded mount option is missing. Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=216721
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

04 Dec 2025, 15:33

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/169a4cf46882974d4db6d85eb623ec898e51bbc0 - () https://git.kernel.org/stable/c/169a4cf46882974d4db6d85eb623ec898e51bbc0 - Patch
References () https://git.kernel.org/stable/c/1742e1c90c3da344f3bb9b1f1309b3f47482756a - () https://git.kernel.org/stable/c/1742e1c90c3da344f3bb9b1f1309b3f47482756a - Patch
References () https://git.kernel.org/stable/c/b8e7ed42bc3ca0d0e4191ee394d34962d3624c22 - () https://git.kernel.org/stable/c/b8e7ed42bc3ca0d0e4191ee394d34962d3624c22 - Patch
References () https://git.kernel.org/stable/c/fce3713197ebba239e1c7e02174ed216ea1ee014 - () https://git.kernel.org/stable/c/fce3713197ebba239e1c7e02174ed216ea1ee014 - Patch
First Time Linux
Linux linux Kernel
CWE CWE-416

15 Sep 2025, 15:22

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-15 15:15

Updated : 2025-12-04 15:33


NVD link : CVE-2022-50300

Mitre link : CVE-2022-50300

CVE.ORG link : CVE-2022-50300


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free