CVE-2022-50730

Source
https://cve.org/CVERecord?id=CVE-2022-50730
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50730.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50730
Downstream
Related
Published
2025-12-24T12:22:50.416Z
Modified
2026-03-20T11:47:36.140215Z
Summary
ext4: silence the warning when evicting inode with dioread_nolock
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: silence the warning when evicting inode with dioread_nolock

When evicting an inode with default dioreadnolock, it could be raced by the unwritten extents converting kworker after writeback some new allocated dirty blocks. It convert unwritten extents to written, the extents could be merged to upper level and free extent blocks, so it could mark the inode dirty again even this inode has been marked IFREEING. But the inode->iiolist check and warning in ext4evictinode() missing this corner case. Fortunately, ext4evictinode() will wait all extents converting finished before this check, so it will not lead to inode use-after-free problem, every thing is OK besides this warning. The WARNONONCE was originally designed for finding inode use-after-free issues in advance, but if we add current dioread_nolock case in, it will become not quite useful, so fix this warning by just remove this check.

====== WARNING: CPU: 7 PID: 1092 at fs/ext4/inode.c:227 ext4evictinode+0x875/0xc60 ... RIP: 0010:ext4evictinode+0x875/0xc60 ... Call Trace: <TASK> evict+0x11c/0x2b0 iput+0x236/0x3a0 do_unlinkat+0x1b4/0x490 __x64sysunlinkat+0x4c/0xb0 dosyscall64+0x3b/0x90 entrySYSCALL64afterhwframe+0x46/0xb0 RIP: 0033:0x7fa933c1115b ======

rm kworker ext4endioend() vfsunlink() ext4unlink() ext4convertunwrittenioendvec() ext4convertunwrittenextents() ext4mapblocks() ext4extmapblocks() ext4exttrytomerge_up() _markinodedirty() check !IFREEING lockedinodetowbandlocklist() iput() iputfinal() evict() ext4evictinode() truncateinodepagesfinal() //wait release ioend inodeiolistmovelocked() ext4releaseioend() trigger WARNONONCE()

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50730.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ceff86fddae8748fe00d4f2d249cb02cae62ad84
Fixed
bdc698ce91f232fd5eb11d2373e9f82f687314b8
Fixed
0d041b7251c13679a0f6c7926751ce1d8a7237c1
Fixed
3b893cc9a8d8b4e486a6639f5e107b56b7197d2e
Fixed
b085fb43feede48ebf80ab7e2dd150c8d9902932
Fixed
bc12ac98ea2e1b70adc6478c8b473a0003b659d3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50730.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.8.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.87
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.18
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50730.json"