CVE-2022-50571Function Call with Incorrectly Specified Arguments in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 92.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 22

Description

In the Linux kernel, the following vulnerability has been resolved: btrfs: call __btrfs_remove_free_space_cache_locked on cache load failure Now that lockdep is staying enabled through our entire CI runs I started seeing the following stack in generic/475 ------------[ cut here ]------------ WARNING: CPU: 1 PID: 2171864 at fs/btrfs/discard.c:604 btrfs_discard_update_discardable+0x98/0xb0 CPU: 1 PID: 2171864 Comm: kworker/u4:0 Not tainted 5.19.0-rc8+ #789 Hardware name: QEMU Standard PC (Q35 +

Affected Packages4 packages

Linuxlinux/linux_kernel5.11.05.19.17
Debianlinux/linux_kernel< 6.1.4-1+2
CVEListV5linux/linuxcd79909bc7cdd8043a22d699aae1e8435792c824819a61301275dcc573e3f520be3dc2c8531bee2d+2
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-3w5q-vc28-c92f: In the Linux kernel, the following vulnerability has been resolved: btrfs: call __btrfs_remove_free_space_cache_locked on cache load failure Now tha2025-10-22
OSV
CVE-2022-50571: In the Linux kernel, the following vulnerability has been resolved: btrfs: call __btrfs_remove_free_space_cache_locked on cache load failure Now that2025-10-22
OSV
btrfs: call __btrfs_remove_free_space_cache_locked on cache load failure2025-10-22

📋Vendor Advisories

2
Red Hat
kernel: btrfs: call __btrfs_remove_free_space_cache_locked on cache load failure2025-10-22
Debian
CVE-2022-50571: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: call...2022