CVE-2022-50546

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-50546
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50546.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50546
Downstream
Related
Published
2025-10-07T15:21:09.963Z
Modified
2025-11-28T09:53:15.345845Z
Summary
ext4: fix uninititialized value in 'ext4_evict_inode'
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix uninititialized value in 'ext4evictinode'

Syzbot found the following issue:

BUG: KMSAN: uninit-value in ext4evictinode+0xdd/0x26b0 fs/ext4/inode.c:180 ext4evictinode+0xdd/0x26b0 fs/ext4/inode.c:180 evict+0x365/0x9a0 fs/inode.c:664 iputfinal fs/inode.c:1747 [inline] iput+0x985/0xdd0 fs/inode.c:1773 _ext4newinode+0xe54/0x7ec0 fs/ext4/ialloc.c:1361 ext4mknod+0x376/0x840 fs/ext4/namei.c:2844 vfsmknod+0x79d/0x830 fs/namei.c:3914 domknodat+0x47d/0xaa0 _dosysmknodat fs/namei.c:3992 [inline] _sesysmknodat fs/namei.c:3989 [inline] _ia32sysmknodat+0xeb/0x150 fs/namei.c:3989 dosyscall32irqson arch/x86/entry/common.c:112 [inline] _dofastsyscall32+0xa2/0x100 arch/x86/entry/common.c:178 dofastsyscall32+0x33/0x70 arch/x86/entry/common.c:203 doSYSENTER32+0x1b/0x20 arch/x86/entry/common.c:246 entrySYSENTERcompatafter_hwframe+0x70/0x82

Uninit was created at: allocpages+0x9f1/0xe80 mm/pagealloc.c:5578 allocpages+0xaae/0xd80 mm/mempolicy.c:2285 allocslabpage mm/slub.c:1794 [inline] allocateslab+0x1b5/0x1010 mm/slub.c:1939 newslab mm/slub.c:1992 [inline] _slaballoc+0x10c3/0x2d60 mm/slub.c:3180 _slaballoc mm/slub.c:3279 [inline] slaballocnode mm/slub.c:3364 [inline] slaballoc mm/slub.c:3406 [inline] _kmemcachealloclru mm/slub.c:3413 [inline] kmemcachealloclru+0x6f3/0xb30 mm/slub.c:3429 allocinodesb include/linux/fs.h:3117 [inline] ext4allocinode+0x5f/0x860 fs/ext4/super.c:1321 allocinode+0x83/0x440 fs/inode.c:259 newinodepseudo fs/inode.c:1018 [inline] newinode+0x3b/0x430 fs/inode.c:1046 _ext4newinode+0x2a7/0x7ec0 fs/ext4/ialloc.c:959 ext4mkdir+0x4d5/0x1560 fs/ext4/namei.c:2992 vfsmkdir+0x62a/0x870 fs/namei.c:4035 domkdirat+0x466/0x7b0 fs/namei.c:4060 _dosysmkdirat fs/namei.c:4075 [inline] _sesysmkdirat fs/namei.c:4073 [inline] _ia32sysmkdirat+0xc4/0x120 fs/namei.c:4073 dosyscall32irqson arch/x86/entry/common.c:112 [inline] _dofastsyscall32+0xa2/0x100 arch/x86/entry/common.c:178 dofastsyscall32+0x33/0x70 arch/x86/entry/common.c:203 doSYSENTER32+0x1b/0x20 arch/x86/entry/common.c:246 entrySYSENTERcompatafterhwframe+0x70/0x82

CPU: 1 PID: 4625 Comm: syz-executor.2 Not tainted 6.1.0-rc4-syzkaller-62821-gcb231e2f67ec #0

Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022

Now, 'ext4allocinode()' didn't init 'ei->iflags'. If new inode failed before set 'ei->iflags' in '_ext4newinode()', then do 'iput()'. As after 6bc0d63dad7f commit will access 'ei->iflags' in 'ext4evictinode()' which will lead to access uninit-value. To solve above issue just init 'ei->iflags' in 'ext4alloc_inode()'.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50546.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bb337d8dd1e1d6b7719872e45e36392f3ab14b4f
Fixed
f0bffdcc7cb14598af2aa706f1e0f2a9054154ba
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a5f9bd4beae8553480d02b569d4aabee1b49345d
Fixed
e431b4fb1fb8c2654b808086e9747a000adb9655
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0e6fbc566fcc4c230bf80f76cf5df26b42142d8a
Fixed
091f85db4c3fb1734a6d7fb4777a2b2831da6631
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0b885394fd009aa0b46d81b496a816ab11309f8a
Fixed
3c31d8d3ad95aef8cc17a4fcf317e46217148439
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6bc0d63dad7f9f54d381925ee855b402f652fa39
Fixed
56491d60ddca9c697d885394cb0173675b9ab81f
Fixed
9f966e021c20caae639dd0e404c8761e8281a2c4
Fixed
7ea71af94eaaaf6d9aed24bc94a05b977a741cb9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
819d16f7feaca0f2ed3409be14fe953127fc51b6
Last affected
458aee4a6e5be7ad862ee27dfaf07ce552d84f32

Affected versions

v2.*

v2.6.12
v2.6.12-rc2
v2.6.12-rc3
v2.6.12-rc4
v2.6.12-rc5
v2.6.12-rc6
v2.6.13
v2.6.13-rc1
v2.6.13-rc2
v2.6.13-rc3
v2.6.13-rc4
v2.6.13-rc5
v2.6.13-rc6
v2.6.13-rc7
v2.6.14
v2.6.14-rc1
v2.6.14-rc2
v2.6.14-rc3
v2.6.14-rc4
v2.6.14-rc5
v2.6.15
v2.6.15-rc1
v2.6.15-rc2
v2.6.15-rc3
v2.6.15-rc4
v2.6.15-rc5
v2.6.15-rc6
v2.6.15-rc7
v2.6.16
v2.6.16-rc1
v2.6.16-rc2
v2.6.16-rc3
v2.6.16-rc4
v2.6.16-rc5
v2.6.16-rc6
v2.6.17
v2.6.17-rc1
v2.6.17-rc2
v2.6.17-rc3
v2.6.17-rc4
v2.6.17-rc5
v2.6.17-rc6
v2.6.18
v2.6.18-rc1
v2.6.18-rc2
v2.6.18-rc3
v2.6.18-rc4
v2.6.18-rc5
v2.6.18-rc6
v2.6.18-rc7
v2.6.19
v2.6.19-rc1
v2.6.19-rc2
v2.6.19-rc3
v2.6.19-rc4
v2.6.19-rc5
v2.6.19-rc6
v2.6.20
v2.6.20-rc1
v2.6.20-rc2
v2.6.20-rc3
v2.6.20-rc4
v2.6.20-rc5
v2.6.20-rc6
v2.6.20-rc7
v2.6.21
v2.6.21-rc1
v2.6.21-rc2
v2.6.21-rc3
v2.6.21-rc4
v2.6.21-rc5
v2.6.21-rc6
v2.6.21-rc7
v2.6.22
v2.6.22-rc1
v2.6.22-rc2
v2.6.22-rc3
v2.6.22-rc4
v2.6.22-rc5
v2.6.22-rc6
v2.6.22-rc7
v2.6.23
v2.6.23-rc1
v2.6.23-rc2
v2.6.23-rc3
v2.6.23-rc4
v2.6.23-rc5
v2.6.23-rc6
v2.6.23-rc7
v2.6.23-rc8
v2.6.23-rc9
v2.6.24
v2.6.24-rc1
v2.6.24-rc2
v2.6.24-rc3
v2.6.24-rc4
v2.6.24-rc5
v2.6.24-rc6
v2.6.24-rc7
v2.6.24-rc8
v2.6.25
v2.6.25-rc1
v2.6.25-rc2
v2.6.25-rc3
v2.6.25-rc4
v2.6.25-rc5
v2.6.25-rc6
v2.6.25-rc7
v2.6.25-rc8
v2.6.25-rc9
v2.6.26
v2.6.26-rc1
v2.6.26-rc2
v2.6.26-rc3
v2.6.26-rc4
v2.6.26-rc5
v2.6.26-rc6
v2.6.26-rc7
v2.6.26-rc8
v2.6.26-rc9
v2.6.27
v2.6.27-rc1
v2.6.27-rc2
v2.6.27-rc3
v2.6.27-rc4
v2.6.27-rc5
v2.6.27-rc6
v2.6.27-rc7
v2.6.27-rc8
v2.6.27-rc9
v2.6.28
v2.6.28-rc1
v2.6.28-rc2
v2.6.28-rc3
v2.6.28-rc4
v2.6.28-rc5
v2.6.28-rc6
v2.6.28-rc7
v2.6.28-rc8
v2.6.28-rc9
v2.6.29
v2.6.29-rc1
v2.6.29-rc2
v2.6.29-rc3
v2.6.29-rc4
v2.6.29-rc5
v2.6.29-rc6
v2.6.29-rc7
v2.6.29-rc8
v2.6.30
v2.6.30-rc1
v2.6.30-rc2
v2.6.30-rc3
v2.6.30-rc4
v2.6.30-rc5
v2.6.30-rc6
v2.6.30-rc7
v2.6.30-rc8
v2.6.31
v2.6.31-rc1
v2.6.31-rc2
v2.6.31-rc3
v2.6.31-rc4
v2.6.31-rc5
v2.6.31-rc6
v2.6.31-rc7
v2.6.31-rc8
v2.6.31-rc9
v2.6.32
v2.6.32-rc1
v2.6.32-rc2
v2.6.32-rc3
v2.6.32-rc4
v2.6.32-rc5
v2.6.32-rc6
v2.6.32-rc7
v2.6.32-rc8
v2.6.33
v2.6.33-rc1
v2.6.33-rc2
v2.6.33-rc3
v2.6.33-rc4
v2.6.33-rc5
v2.6.33-rc6
v2.6.33-rc7
v2.6.33-rc8
v2.6.34
v2.6.34-rc1
v2.6.34-rc2
v2.6.34-rc3
v2.6.34-rc4
v2.6.34-rc5
v2.6.34-rc6
v2.6.34-rc7
v2.6.35
v2.6.35-rc1
v2.6.35-rc2
v2.6.35-rc3
v2.6.35-rc4
v2.6.35-rc5
v2.6.35-rc6
v2.6.36
v2.6.36-rc1
v2.6.36-rc2
v2.6.36-rc3
v2.6.36-rc4
v2.6.36-rc5
v2.6.36-rc6
v2.6.36-rc7
v2.6.36-rc8
v2.6.37
v2.6.37-rc1
v2.6.37-rc2
v2.6.37-rc3
v2.6.37-rc4
v2.6.37-rc5
v2.6.37-rc6
v2.6.37-rc7
v2.6.37-rc8
v2.6.38
v2.6.38-rc1
v2.6.38-rc2
v2.6.38-rc3
v2.6.38-rc4
v2.6.38-rc5
v2.6.38-rc6
v2.6.38-rc7
v2.6.38-rc8
v2.6.39
v2.6.39-rc1
v2.6.39-rc2
v2.6.39-rc3
v2.6.39-rc4
v2.6.39-rc5
v2.6.39-rc6
v2.6.39-rc7

v3.*

v3.0
v3.0-rc1
v3.0-rc2
v3.0-rc3
v3.0-rc4
v3.0-rc5
v3.0-rc6
v3.0-rc7
v3.1
v3.1-rc1
v3.1-rc10
v3.1-rc2
v3.1-rc3
v3.1-rc4
v3.1-rc5
v3.1-rc6
v3.1-rc7
v3.1-rc8
v3.1-rc9
v3.10
v3.10-rc1
v3.10-rc2
v3.10-rc3
v3.10-rc4
v3.10-rc5
v3.10-rc6
v3.10-rc7
v3.11
v3.11-rc1
v3.11-rc2
v3.11-rc3
v3.11-rc4
v3.11-rc5
v3.11-rc6
v3.11-rc7
v3.12
v3.12-rc1
v3.12-rc2
v3.12-rc3
v3.12-rc4
v3.12-rc5
v3.12-rc6
v3.12-rc7
v3.13
v3.13-rc1
v3.13-rc2
v3.13-rc3
v3.13-rc4
v3.13-rc5
v3.13-rc6
v3.13-rc7
v3.13-rc8
v3.14
v3.14-rc1
v3.14-rc2
v3.14-rc3
v3.14-rc4
v3.14-rc5
v3.14-rc6
v3.14-rc7
v3.14-rc8
v3.15
v3.15-rc1
v3.15-rc2
v3.15-rc3
v3.15-rc4
v3.15-rc5
v3.15-rc6
v3.15-rc7
v3.15-rc8
v3.16
v3.16-rc1
v3.16-rc2
v3.16-rc3
v3.16-rc4
v3.16-rc5
v3.16-rc6
v3.16-rc7
v3.17
v3.17-rc1
v3.17-rc2
v3.17-rc3
v3.17-rc4
v3.17-rc5
v3.17-rc6
v3.17-rc7
v3.18
v3.18-rc1
v3.18-rc2
v3.18-rc3
v3.18-rc4
v3.18-rc5
v3.18-rc6
v3.18-rc7
v3.19
v3.19-rc1
v3.19-rc2
v3.19-rc3
v3.19-rc4
v3.19-rc5
v3.19-rc6
v3.19-rc7
v3.2
v3.2-rc1
v3.2-rc2
v3.2-rc3
v3.2-rc4
v3.2-rc5
v3.2-rc6
v3.2-rc7
v3.3
v3.3-rc1
v3.3-rc2
v3.3-rc3
v3.3-rc4
v3.3-rc5
v3.3-rc6
v3.3-rc7
v3.4
v3.4-rc1
v3.4-rc2
v3.4-rc3
v3.4-rc4
v3.4-rc5
v3.4-rc6
v3.4-rc7
v3.5
v3.5-rc1
v3.5-rc2
v3.5-rc3
v3.5-rc4
v3.5-rc5
v3.5-rc6
v3.5-rc7
v3.6
v3.6-rc1
v3.6-rc2
v3.6-rc3
v3.6-rc4
v3.6-rc5
v3.6-rc6
v3.6-rc7
v3.7
v3.7-rc1
v3.7-rc2
v3.7-rc3
v3.7-rc4
v3.7-rc5
v3.7-rc6
v3.7-rc7
v3.7-rc8
v3.8
v3.8-rc1
v3.8-rc2
v3.8-rc3
v3.8-rc4
v3.8-rc5
v3.8-rc6
v3.8-rc7
v3.9
v3.9-rc1
v3.9-rc2
v3.9-rc3
v3.9-rc4
v3.9-rc5
v3.9-rc6
v3.9-rc7
v3.9-rc8

v4.*

v4.0
v4.0-rc1
v4.0-rc2
v4.0-rc3
v4.0-rc4
v4.0-rc5
v4.0-rc6
v4.0-rc7
v4.1
v4.1-rc1
v4.1-rc2
v4.1-rc3
v4.1-rc4
v4.1-rc5
v4.1-rc6
v4.1-rc7
v4.1-rc8
v4.10
v4.10-rc1
v4.10-rc2
v4.10-rc3
v4.10-rc4
v4.10-rc5
v4.10-rc6
v4.10-rc7
v4.10-rc8
v4.11
v4.11-rc1
v4.11-rc2
v4.11-rc3
v4.11-rc4
v4.11-rc5
v4.11-rc6
v4.11-rc7
v4.11-rc8
v4.12
v4.12-rc1
v4.12-rc2
v4.12-rc3
v4.12-rc4
v4.12-rc5
v4.12-rc6
v4.12-rc7
v4.13
v4.13-rc1
v4.13-rc2
v4.13-rc3
v4.13-rc4
v4.13-rc5
v4.13-rc6
v4.13-rc7
v4.14
v4.14-rc1
v4.14-rc2
v4.14-rc3
v4.14-rc4
v4.14-rc5
v4.14-rc6
v4.14-rc7
v4.14-rc8
v4.15
v4.15-rc1
v4.15-rc2
v4.15-rc3
v4.15-rc4
v4.15-rc5
v4.15-rc6
v4.15-rc7
v4.15-rc8
v4.15-rc9
v4.16
v4.16-rc1
v4.16-rc2
v4.16-rc3
v4.16-rc4
v4.16-rc5
v4.16-rc6
v4.16-rc7
v4.17
v4.17-rc1
v4.17-rc2
v4.17-rc3
v4.17-rc4
v4.17-rc5
v4.17-rc6
v4.17-rc7
v4.18
v4.18-rc1
v4.18-rc2
v4.18-rc3
v4.18-rc4
v4.18-rc5
v4.18-rc6
v4.18-rc7
v4.18-rc8
v4.19
v4.19-rc1
v4.19-rc2
v4.19-rc3
v4.19-rc4
v4.19-rc5
v4.19-rc6
v4.19-rc7
v4.19-rc8
v4.2
v4.2-rc1
v4.2-rc2
v4.2-rc3
v4.2-rc4
v4.2-rc5
v4.2-rc6
v4.2-rc7
v4.2-rc8
v4.20
v4.20-rc1
v4.20-rc2
v4.20-rc3
v4.20-rc4
v4.20-rc5
v4.20-rc6
v4.20-rc7
v4.3
v4.3-rc1
v4.3-rc2
v4.3-rc3
v4.3-rc4
v4.3-rc5
v4.3-rc6
v4.3-rc7
v4.4
v4.4-rc1
v4.4-rc2
v4.4-rc3
v4.4-rc4
v4.4-rc5
v4.4-rc6
v4.4-rc7
v4.4-rc8
v4.5
v4.5-rc1
v4.5-rc2
v4.5-rc3
v4.5-rc4
v4.5-rc5
v4.5-rc6
v4.5-rc7
v4.6
v4.6-rc1
v4.6-rc2
v4.6-rc3
v4.6-rc4
v4.6-rc5
v4.6-rc6
v4.6-rc7
v4.7
v4.7-rc1
v4.7-rc2
v4.7-rc3
v4.7-rc4
v4.7-rc5
v4.7-rc6
v4.7-rc7
v4.8
v4.8-rc1
v4.8-rc2
v4.8-rc3
v4.8-rc4
v4.8-rc5
v4.8-rc6
v4.8-rc7
v4.8-rc8
v4.9
v4.9-rc1
v4.9-rc2
v4.9-rc3
v4.9-rc4
v4.9-rc5
v4.9-rc6
v4.9-rc7
v4.9-rc8

v5.*

v5.0
v5.0-rc1
v5.0-rc2
v5.0-rc3
v5.0-rc4
v5.0-rc5
v5.0-rc6
v5.0-rc7
v5.0-rc8
v5.1
v5.1-rc1
v5.1-rc2
v5.1-rc3
v5.1-rc4
v5.1-rc5
v5.1-rc6
v5.1-rc7
v5.10
v5.10-rc1
v5.10-rc2
v5.10-rc3
v5.10-rc4
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.10.163
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.61
v5.15.62
v5.15.63
v5.15.64
v5.15.65
v5.15.66
v5.15.67
v5.15.68
v5.15.69
v5.15.70
v5.15.71
v5.15.72
v5.15.73
v5.15.74
v5.15.75
v5.15.76
v5.15.77
v5.15.78
v5.15.79
v5.15.80
v5.15.81
v5.15.82
v5.15.83
v5.15.84
v5.15.85
v5.15.86
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.18.1
v5.18.10
v5.18.11
v5.18.12
v5.18.13
v5.18.14
v5.18.15
v5.18.16
v5.18.17
v5.18.2
v5.18.3
v5.18.4
v5.18.5
v5.18.6
v5.18.7
v5.18.8
v5.18.9
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v5.19.1
v5.2
v5.2-rc1
v5.2-rc2
v5.2-rc3
v5.2-rc4
v5.2-rc5
v5.2-rc6
v5.2-rc7
v5.3
v5.3-rc1
v5.3-rc2
v5.3-rc3
v5.3-rc4
v5.3-rc5
v5.3-rc6
v5.3-rc7
v5.3-rc8
v5.4
v5.4-rc1
v5.4-rc2
v5.4-rc3
v5.4-rc4
v5.4-rc5
v5.4-rc6
v5.4-rc7
v5.4-rc8
v5.5
v5.5-rc1
v5.5-rc2
v5.5-rc3
v5.5-rc4
v5.5-rc5
v5.5-rc6
v5.5-rc7
v5.6
v5.6-rc1
v5.6-rc2
v5.6-rc3
v5.6-rc4
v5.6-rc5
v5.6-rc6
v5.6-rc7
v5.7
v5.7-rc1
v5.7-rc2
v5.7-rc3
v5.7-rc4
v5.7-rc5
v5.7-rc6
v5.7-rc7
v5.8
v5.8-rc1
v5.8-rc2
v5.8-rc3
v5.8-rc4
v5.8-rc5
v5.8-rc6
v5.8-rc7
v5.9
v5.9-rc1
v5.9-rc2
v5.9-rc3
v5.9-rc4
v5.9-rc5
v5.9-rc6
v5.9-rc7
v5.9-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.0.1
v6.0.10
v6.0.11
v6.0.12
v6.0.13
v6.0.14
v6.0.15
v6.0.16
v6.0.17
v6.0.2
v6.0.3
v6.0.4
v6.0.5
v6.0.6
v6.0.7
v6.0.8
v6.0.9
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.2
v6.1.3

Database specific

vanir_signatures

[
    {
        "digest": {
            "line_hashes": [
                "177201396537408864454898488221105264295",
                "274213873119526309839694749244369609917",
                "27789437871307591882528706308404237399",
                "175811605665214789522978019941386315154"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2022-50546-39538bc1",
        "signature_version": "v1",
        "target": {
            "file": "fs/ext4/super.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f0bffdcc7cb14598af2aa706f1e0f2a9054154ba",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "digest": {
            "function_hash": "290000275720324737610193376651513191492",
            "length": 1146.0
        },
        "id": "CVE-2022-50546-41138ae0",
        "signature_version": "v1",
        "target": {
            "file": "fs/ext4/super.c",
            "function": "ext4_alloc_inode"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ea71af94eaaaf6d9aed24bc94a05b977a741cb9",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "digest": {
            "line_hashes": [
                "204726844277087665435857034501893744191",
                "274213873119526309839694749244369609917",
                "27789437871307591882528706308404237399",
                "14513457880176619836016320772256524050"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2022-50546-4df43d89",
        "signature_version": "v1",
        "target": {
            "file": "fs/ext4/super.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ea71af94eaaaf6d9aed24bc94a05b977a741cb9",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "digest": {
            "function_hash": "290000275720324737610193376651513191492",
            "length": 1146.0
        },
        "id": "CVE-2022-50546-5c953035",
        "signature_version": "v1",
        "target": {
            "file": "fs/ext4/super.c",
            "function": "ext4_alloc_inode"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f966e021c20caae639dd0e404c8761e8281a2c4",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "digest": {
            "line_hashes": [
                "177201396537408864454898488221105264295",
                "274213873119526309839694749244369609917",
                "27789437871307591882528706308404237399",
                "14513457880176619836016320772256524050"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2022-50546-60e0d6a8",
        "signature_version": "v1",
        "target": {
            "file": "fs/ext4/super.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@091f85db4c3fb1734a6d7fb4777a2b2831da6631",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "digest": {
            "line_hashes": [
                "204726844277087665435857034501893744191",
                "274213873119526309839694749244369609917",
                "27789437871307591882528706308404237399",
                "14513457880176619836016320772256524050"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2022-50546-717e1c6c",
        "signature_version": "v1",
        "target": {
            "file": "fs/ext4/super.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f966e021c20caae639dd0e404c8761e8281a2c4",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "digest": {
            "line_hashes": [
                "204726844277087665435857034501893744191",
                "274213873119526309839694749244369609917",
                "27789437871307591882528706308404237399",
                "14513457880176619836016320772256524050"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2022-50546-8517e245",
        "signature_version": "v1",
        "target": {
            "file": "fs/ext4/super.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@56491d60ddca9c697d885394cb0173675b9ab81f",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "digest": {
            "function_hash": "247364116720937734183461309911370780811",
            "length": 1065.0
        },
        "id": "CVE-2022-50546-8c8500eb",
        "signature_version": "v1",
        "target": {
            "file": "fs/ext4/super.c",
            "function": "ext4_alloc_inode"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f0bffdcc7cb14598af2aa706f1e0f2a9054154ba",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "digest": {
            "function_hash": "321047826464045698612041508399062125435",
            "length": 1138.0
        },
        "id": "CVE-2022-50546-939a41a9",
        "signature_version": "v1",
        "target": {
            "file": "fs/ext4/super.c",
            "function": "ext4_alloc_inode"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3c31d8d3ad95aef8cc17a4fcf317e46217148439",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "digest": {
            "line_hashes": [
                "177201396537408864454898488221105264295",
                "274213873119526309839694749244369609917",
                "27789437871307591882528706308404237399",
                "14513457880176619836016320772256524050"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2022-50546-bab355bd",
        "signature_version": "v1",
        "target": {
            "file": "fs/ext4/super.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3c31d8d3ad95aef8cc17a4fcf317e46217148439",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "digest": {
            "function_hash": "321047826464045698612041508399062125435",
            "length": 1138.0
        },
        "id": "CVE-2022-50546-d20bb53a",
        "signature_version": "v1",
        "target": {
            "file": "fs/ext4/super.c",
            "function": "ext4_alloc_inode"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@091f85db4c3fb1734a6d7fb4777a2b2831da6631",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "digest": {
            "function_hash": "290000275720324737610193376651513191492",
            "length": 1146.0
        },
        "id": "CVE-2022-50546-e712126b",
        "signature_version": "v1",
        "target": {
            "file": "fs/ext4/super.c",
            "function": "ext4_alloc_inode"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@56491d60ddca9c697d885394cb0173675b9ab81f",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "digest": {
            "line_hashes": [
                "177201396537408864454898488221105264295",
                "274213873119526309839694749244369609917",
                "27789437871307591882528706308404237399",
                "175811605665214789522978019941386315154"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2022-50546-f194fb3e",
        "signature_version": "v1",
        "target": {
            "file": "fs/ext4/super.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e431b4fb1fb8c2654b808086e9747a000adb9655",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "digest": {
            "function_hash": "83218045925037166414018827351148564983",
            "length": 1104.0
        },
        "id": "CVE-2022-50546-fe6fd24a",
        "signature_version": "v1",
        "target": {
            "file": "fs/ext4/super.c",
            "function": "ext4_alloc_inode"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e431b4fb1fb8c2654b808086e9747a000adb9655",
        "deprecated": false,
        "signature_type": "Function"
    }
]

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50546.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.164
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.87
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.18
Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.1.4

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50546.json"