CVE-2022-50519

Source
https://cve.org/CVERecord?id=CVE-2022-50519
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50519.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50519
Downstream
Related
Published
2025-10-07T15:19:13.844Z
Modified
2026-03-12T03:26:36.020475Z
Summary
nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure
Details

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: replace WARNONs by nilfserror for checkpoint acquisition failure

If creation or finalization of a checkpoint fails due to anomalies in the checkpoint metadata on disk, a kernel warning is generated.

This patch replaces the WARNONs by nilfserror, so that a kernel, booted with paniconwarn, does not panic. A nilfs_error is appropriate here to handle the abnormal filesystem condition.

This also replaces the detected error codes with an I/O error so that neither of the internal error codes is returned to callers.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50519.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9ff05123e3bfbb1d2b68ba1d9bf1f7d1dffc1453
Fixed
b63026b5e13040cd5afa11769dd0d9e1504b031a
Fixed
ae16440c44ae2acda6d72aff9d74eccf8967dae5
Fixed
bf98be80cbe3b4e6c86c36ed00457389aca3eb15
Fixed
259c0f68168ac6a598db3486597b10e74d625db0
Fixed
8a18fdc5ae8e6d7ac33c6ee0a2e5f9f1414ef412
Fixed
c0c3d3d3ea41cb5228ee90568bb953f9a56c3227
Fixed
090fcfb6edeb9367a915b2749e2bd1f8b48d8898
Fixed
5c0776b5bc31de7cd28afb558fae37a20f33602e
Fixed
723ac751208f6d6540191689cfbf6c77135a7a1b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50519.json"