CVE-2022-50020

Source
https://cve.org/CVERecord?id=CVE-2022-50020
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50020.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50020
Downstream
Related
Published
2025-06-18T11:01:24.227Z
Modified
2026-03-20T12:22:31.743477Z
Summary
ext4: avoid resizing to a partial cluster size
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid resizing to a partial cluster size

This patch avoids an attempt to resize the filesystem to an unaligned cluster boundary. An online resize to a size that is not integral to cluster size results in the last iteration attempting to grow the fs by a negative amount, which trips a BUG_ON and leaves the fs with a corrupted in-memory superblock.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50020.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d77147ff443b255d82c907a632c825b2cc610b10
Fixed
7bdfb01fc5f6b3696728aeb527c50386e0ee09a1
Fixed
a6805b3dcf5cd41f2ae3a03dca43411135b99849
Fixed
80288883294c5b4ed18bae0d8bd9c4a12f297074
Fixed
72b850a2a996f72541172e7cf686d54a2b29bcd8
Fixed
0082e99a9074ff88eff729c70c93454c8588d8e1
Fixed
69cb8e9d8cd97cdf5e293b26d70a9dee3e35e6bd

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50020.json"