vulnerability
Ubuntu: (CVE-2022-50485): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Oct 4, 2025 | Oct 10, 2025 | Dec 2, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved: ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode There are many places that will get unhappy (and crash) when ext4_iget() returns a bad inode. However, if iget the boot loader inode, allows a bad inode to be returned, because the inode may not be initialized. This mechanism can be used to bypass some checks and cause panic. To solve this problem, we add a special iget flag EXT4_IGET_BAD. Only with this flag we'd be returning bad inode from ext4_iget(), otherwise we always return the error code if the inode is bad inode.(suggested by Jan Kara)
Solutions
References
- CVE-2022-50485
- https://attackerkb.com/topics/CVE-2022-50485
- URL-https://git.kernel.org/linus/63b1e9bccb71fe7d7e3ddc9877dbdc85e5d2d023
- URL-https://git.kernel.org/stable/c/2142dfa1de61e25b83198af0308ec7689cca25d3
- URL-https://git.kernel.org/stable/c/488a5c2bf7543c3cd3f07a025f2e62be91599430
- URL-https://git.kernel.org/stable/c/63b1e9bccb71fe7d7e3ddc9877dbdc85e5d2d023
- URL-https://git.kernel.org/stable/c/c0a738875c2e9c8c3366d792f8bf7fe508d5e5a5
- URL-https://git.kernel.org/stable/c/f725b290ed79ad61e4f721fee95a287892d8b1ad
- URL-https://git.kernel.org/stable/c/f7e6b5548f915d7aa435d0764d41eacfb49c6e09
- URL-https://www.cve.org/CVERecord?id=CVE-2022-50485
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.