CVE-2022-50485

Source
https://cve.org/CVERecord?id=CVE-2022-50485
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50485.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50485
Downstream
Related
Published
2025-10-04T15:16:43.093Z
Modified
2026-03-20T11:47:29.596585Z
Summary
ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: add EXT4IGETBAD flag to prevent unexpected bad inode

There are many places that will get unhappy (and crash) when ext4iget() returns a bad inode. However, if iget the boot loader inode, allows a bad inode to be returned, because the inode may not be initialized. This mechanism can be used to bypass some checks and cause panic. To solve this problem, we add a special iget flag EXT4IGETBAD. Only with this flag we'd be returning bad inode from ext4iget(), otherwise we always return the error code if the inode is bad inode.(suggested by Jan Kara)

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50485.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
393d1d1d76933886d5e1ce603214c9987589c6d5
Fixed
2142dfa1de61e25b83198af0308ec7689cca25d3
Fixed
c0a738875c2e9c8c3366d792f8bf7fe508d5e5a5
Fixed
f7e6b5548f915d7aa435d0764d41eacfb49c6e09
Fixed
f725b290ed79ad61e4f721fee95a287892d8b1ad
Fixed
488a5c2bf7543c3cd3f07a025f2e62be91599430
Fixed
63b1e9bccb71fe7d7e3ddc9877dbdc85e5d2d023

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50485.json"