In the Linux kernel, the following vulnerability has been resolved:
ext4: don't set up encryption key during jbd2 transaction
Commit a80f7fcf1867 ("ext4: fixup ext4_fc_track_* functions' signature")
extended the scope of the transaction in ext4_unlink() too far, making
it include the call to ext4_find_entry(). However, ext4_find_entry()
can deadlock when called from within a transaction because it may need
to set up the directory's encryption key.
Fix this by restoring the transaction to its original scope.
References
Configurations
Configuration 1 (hide)
|
History
21 Jan 2026, 21:38
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:5.10:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.10:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.10:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.10:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.10:rc6:*:*:*:*:*:* |
|
| First Time |
Linux
Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/1ba993208bcfd691e241483420a2a761d3f15750 - Patch | |
| References | () https://git.kernel.org/stable/c/206dd3acfb9bca54a25b228c7c7c2257eedde09b - Patch | |
| References | () https://git.kernel.org/stable/c/23ad034760dd38e12b0e0e1b28b9629f330810a1 - Patch | |
| References | () https://git.kernel.org/stable/c/4c0d5778385cb3618ff26a561ce41de2b7d9de70 - Patch | |
| References | () https://git.kernel.org/stable/c/6220ec405571ded17efedc56587190b542adf246 - Patch |
01 Oct 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-01 12:15
Updated : 2026-01-21 21:38
NVD link : CVE-2022-50436
Mitre link : CVE-2022-50436
CVE.ORG link : CVE-2022-50436
JSON object : View
Products Affected
linux
- linux_kernel
CWE
