CVE-2022-50485

In the Linux kernel, the following vulnerability has been resolved: ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode There are many places that will get unhappy (and crash) when ext4_iget() returns a bad inode. However, if iget the boot loader inode, allows a bad inode to be returned, because the inode may not be initialized. This mechanism can be used to bypass some checks and cause panic. To solve this problem, we add a special iget flag EXT4_IGET_BAD. Only with this flag we'd be returning bad inode from ext4_iget(), otherwise we always return the error code if the inode is bad inode.(suggested by Jan Kara)
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

27 Jan 2026, 17:41

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/2142dfa1de61e25b83198af0308ec7689cca25d3 - () https://git.kernel.org/stable/c/2142dfa1de61e25b83198af0308ec7689cca25d3 - Patch
References () https://git.kernel.org/stable/c/488a5c2bf7543c3cd3f07a025f2e62be91599430 - () https://git.kernel.org/stable/c/488a5c2bf7543c3cd3f07a025f2e62be91599430 - Patch
References () https://git.kernel.org/stable/c/63b1e9bccb71fe7d7e3ddc9877dbdc85e5d2d023 - () https://git.kernel.org/stable/c/63b1e9bccb71fe7d7e3ddc9877dbdc85e5d2d023 - Patch
References () https://git.kernel.org/stable/c/c0a738875c2e9c8c3366d792f8bf7fe508d5e5a5 - () https://git.kernel.org/stable/c/c0a738875c2e9c8c3366d792f8bf7fe508d5e5a5 - Patch
References () https://git.kernel.org/stable/c/f725b290ed79ad61e4f721fee95a287892d8b1ad - () https://git.kernel.org/stable/c/f725b290ed79ad61e4f721fee95a287892d8b1ad - Patch
References () https://git.kernel.org/stable/c/f7e6b5548f915d7aa435d0764d41eacfb49c6e09 - () https://git.kernel.org/stable/c/f7e6b5548f915d7aa435d0764d41eacfb49c6e09 - Patch

04 Oct 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-04 16:15

Updated : 2026-01-27 17:41


NVD link : CVE-2022-50485

Mitre link : CVE-2022-50485

CVE.ORG link : CVE-2022-50485


JSON object : View

Products Affected

linux

  • linux_kernel