{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50485","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-10-04T15:13:33.468Z","datePublished":"2025-10-04T15:16:43.093Z","dateUpdated":"2026-05-11T19:20:24.290Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:20:24.290Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\next4: add EXT4_IGET_BAD flag to prevent unexpected bad inode\n\nThere are many places that will get unhappy (and crash) when ext4_iget()\nreturns a bad inode. However, if iget the boot loader inode, allows a bad\ninode to be returned, because the inode may not be initialized. This\nmechanism can be used to bypass some checks and cause panic. To solve this\nproblem, we add a special iget flag EXT4_IGET_BAD. Only with this flag\nwe'd be returning bad inode from ext4_iget(), otherwise we always return\nthe error code if the inode is bad inode.(suggested by Jan Kara)"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ext4/ext4.h","fs/ext4/inode.c","fs/ext4/ioctl.c"],"versions":[{"version":"393d1d1d76933886d5e1ce603214c9987589c6d5","lessThan":"2142dfa1de61e25b83198af0308ec7689cca25d3","status":"affected","versionType":"git"},{"version":"393d1d1d76933886d5e1ce603214c9987589c6d5","lessThan":"c0a738875c2e9c8c3366d792f8bf7fe508d5e5a5","status":"affected","versionType":"git"},{"version":"393d1d1d76933886d5e1ce603214c9987589c6d5","lessThan":"f7e6b5548f915d7aa435d0764d41eacfb49c6e09","status":"affected","versionType":"git"},{"version":"393d1d1d76933886d5e1ce603214c9987589c6d5","lessThan":"f725b290ed79ad61e4f721fee95a287892d8b1ad","status":"affected","versionType":"git"},{"version":"393d1d1d76933886d5e1ce603214c9987589c6d5","lessThan":"488a5c2bf7543c3cd3f07a025f2e62be91599430","status":"affected","versionType":"git"},{"version":"393d1d1d76933886d5e1ce603214c9987589c6d5","lessThan":"63b1e9bccb71fe7d7e3ddc9877dbdc85e5d2d023","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ext4/ext4.h","fs/ext4/inode.c","fs/ext4/ioctl.c"],"versions":[{"version":"3.10","status":"affected"},{"version":"0","lessThan":"3.10","status":"unaffected","versionType":"semver"},{"version":"5.4.229","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.163","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.87","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.18","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1.4","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10","versionEndExcluding":"5.4.229"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10","versionEndExcluding":"5.10.163"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10","versionEndExcluding":"5.15.87"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10","versionEndExcluding":"6.0.18"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10","versionEndExcluding":"6.1.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10","versionEndExcluding":"6.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/2142dfa1de61e25b83198af0308ec7689cca25d3"},{"url":"https://git.kernel.org/stable/c/c0a738875c2e9c8c3366d792f8bf7fe508d5e5a5"},{"url":"https://git.kernel.org/stable/c/f7e6b5548f915d7aa435d0764d41eacfb49c6e09"},{"url":"https://git.kernel.org/stable/c/f725b290ed79ad61e4f721fee95a287892d8b1ad"},{"url":"https://git.kernel.org/stable/c/488a5c2bf7543c3cd3f07a025f2e62be91599430"},{"url":"https://git.kernel.org/stable/c/63b1e9bccb71fe7d7e3ddc9877dbdc85e5d2d023"}],"title":"ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode","x_generator":{"engine":"bippy-1.2.0"}}}}