DEBIAN-CVE-2022-49167

Source
https://security-tracker.debian.org/tracker/CVE-2022-49167
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-49167.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2022-49167
Upstream
Published
2025-02-26T07:00:53.837Z
Modified
2025-11-19T01:08:53.205282Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: btrfs: do not double complete bio on errors during compressed reads I hit some weird panics while fixing up the error handling from btrfslookupbiosums(). Turns out the compression path will complete the bio we use if we set up any of the compression bios and then return an error, and then btrfssubmitdatabio() will also call bioendio() on the bio. Fix this by making btrfssubmitcompressedread() responsible for calling bioendio() on the bio if there are any errors. Currently it was only doing it if we created the compression bios, otherwise it was depending on btrfssubmitdatabio() to do the right thing. This creates the above problem, so fix up btrfssubmitcompressedread() to always call bioendio() in case of an error, and then simply return from btrfssubmitdatabio() if we had to call btrfssubmitcompressedread().

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.17.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-49167.json"

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.17.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-49167.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.17.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-49167.json"