CVE-2022-50020

Source
https://cve.org/CVERecord?id=CVE-2022-50020
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50020.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50020
Downstream
Related
Published
2025-06-18T11:01:24.227Z
Modified
2026-04-11T12:44:48.324420Z
Summary
ext4: avoid resizing to a partial cluster size
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid resizing to a partial cluster size

This patch avoids an attempt to resize the filesystem to an unaligned cluster boundary. An online resize to a size that is not integral to cluster size results in the last iteration attempting to grow the fs by a negative amount, which trips a BUG_ON and leaves the fs with a corrupted in-memory superblock.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50020.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d77147ff443b255d82c907a632c825b2cc610b10
Fixed
7bdfb01fc5f6b3696728aeb527c50386e0ee09a1
Fixed
a6805b3dcf5cd41f2ae3a03dca43411135b99849
Fixed
80288883294c5b4ed18bae0d8bd9c4a12f297074
Fixed
72b850a2a996f72541172e7cf686d54a2b29bcd8
Fixed
0082e99a9074ff88eff729c70c93454c8588d8e1
Fixed
69cb8e9d8cd97cdf5e293b26d70a9dee3e35e6bd

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50020.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.256
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.211
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.138
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.63
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50020.json"