CVE-2022-50485

Source
https://cve.org/CVERecord?id=CVE-2022-50485
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50485.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50485
Downstream
Related
Published
2025-10-04T15:16:43.093Z
Modified
2026-05-15T11:54:11.236347092Z
Summary
ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: add EXT4IGETBAD flag to prevent unexpected bad inode

There are many places that will get unhappy (and crash) when ext4iget() returns a bad inode. However, if iget the boot loader inode, allows a bad inode to be returned, because the inode may not be initialized. This mechanism can be used to bypass some checks and cause panic. To solve this problem, we add a special iget flag EXT4IGETBAD. Only with this flag we'd be returning bad inode from ext4iget(), otherwise we always return the error code if the inode is bad inode.(suggested by Jan Kara)

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50485.json"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.10.0
Fixed
5.4.229
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.87
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.18
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50485.json"