In the Linux kernel, the following vulnerability has been resolved:
ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode
There are many places that will get unhappy (and crash) when ext4_iget()
returns a bad inode. However, if iget the boot loader inode, allows a bad
inode to be returned, because the inode may not be initialized. This
mechanism can be used to bypass some checks and cause panic. To solve this
problem, we add a special iget flag EXT4_IGET_BAD. Only with this flag
we'd be returning bad inode from ext4_iget(), otherwise we always return
the error code if the inode is bad inode.(suggested by Jan Kara)
References
Configurations
Configuration 1 (hide)
|
History
27 Jan 2026, 17:41
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux
Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/2142dfa1de61e25b83198af0308ec7689cca25d3 - Patch | |
| References | () https://git.kernel.org/stable/c/488a5c2bf7543c3cd3f07a025f2e62be91599430 - Patch | |
| References | () https://git.kernel.org/stable/c/63b1e9bccb71fe7d7e3ddc9877dbdc85e5d2d023 - Patch | |
| References | () https://git.kernel.org/stable/c/c0a738875c2e9c8c3366d792f8bf7fe508d5e5a5 - Patch | |
| References | () https://git.kernel.org/stable/c/f725b290ed79ad61e4f721fee95a287892d8b1ad - Patch | |
| References | () https://git.kernel.org/stable/c/f7e6b5548f915d7aa435d0764d41eacfb49c6e09 - Patch |
04 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-04 16:15
Updated : 2026-01-27 17:41
NVD link : CVE-2022-50485
Mitre link : CVE-2022-50485
CVE.ORG link : CVE-2022-50485
JSON object : View
Products Affected
linux
- linux_kernel
CWE
