{"id":"CVE-2022-50766","summary":"btrfs: set generation before calling btrfs_clean_tree_block in btrfs_init_new_buffer","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: set generation before calling btrfs_clean_tree_block in btrfs_init_new_buffer\n\nsyzbot is reporting uninit-value in btrfs_clean_tree_block() [1], for\ncommit bc877d285ca3dba2 (\"btrfs: Deduplicate extent_buffer init code\")\nmissed that btrfs_set_header_generation() in btrfs_init_new_buffer() must\nnot be moved to after clean_tree_block() because clean_tree_block() is\ncalling btrfs_header_generation() since commit 55c69072d6bd5be1 (\"Btrfs:\nFix extent_buffer usage when nodesize != leafsize\").\n\nSince memzero_extent_buffer() will reset \"struct btrfs_header\" part, we\ncan't move btrfs_set_header_generation() to before memzero_extent_buffer().\nJust re-add btrfs_set_header_generation() before btrfs_clean_tree_block().","modified":"2026-04-02T08:28:45.102427Z","published":"2025-12-24T13:05:56.873Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50766.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0a408c6212c16b9a2a1141d3c531247582ef8101"},{"type":"WEB","url":"https://git.kernel.org/stable/c/89bc41c92d10b905c60f6ec13c9ef664a3555c54"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a687c2890fe4a2acaac6941fa4097a1264d8f3eb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cbddcc4fa3443fe8cfb2ff8e210deb1f6a0eea38"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50766.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50766"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"bc877d285ca3dba24c52406946a4a69847cc7422"},{"fixed":"0a408c6212c16b9a2a1141d3c531247582ef8101"},{"fixed":"a687c2890fe4a2acaac6941fa4097a1264d8f3eb"},{"fixed":"89bc41c92d10b905c60f6ec13c9ef664a3555c54"},{"fixed":"cbddcc4fa3443fe8cfb2ff8e210deb1f6a0eea38"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50766.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.19.0"},{"fixed":"5.15.75"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"5.19.17"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.20.0"},{"fixed":"6.0.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50766.json"}}],"schema_version":"1.7.5"}