CVE-2022-50082

Source
https://cve.org/CVERecord?id=CVE-2022-50082
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50082.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50082
Downstream
Published
2025-06-18T11:02:24.530Z
Modified
2026-04-02T08:28:12.567037Z
Summary
ext4: fix warning in ext4_iomap_begin as race between bmap and write
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix warning in ext4iomapbegin as race between bmap and write

We got issue as follows: ------------[ cut here ]------------ WARNING: CPU: 3 PID: 9310 at fs/ext4/inode.c:3441 ext4iomapbegin+0x182/0x5d0 RIP: 0010:ext4iomapbegin+0x182/0x5d0 RSP: 0018:ffff88812460fa08 EFLAGS: 00010293 RAX: ffff88811f168000 RBX: 0000000000000000 RCX: ffffffff97793c12 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: ffff88812c669160 R08: ffff88811f168000 R09: ffffed10258cd20f R10: ffff88812c669077 R11: ffffed10258cd20e R12: 0000000000000001 R13: 00000000000000a4 R14: 000000000000000c R15: ffff88812c6691ee FS: 00007fd0d6ff3740(0000) GS:ffff8883af180000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd0d6dda290 CR3: 0000000104a62000 CR4: 00000000000006e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: iomapapply+0x119/0x570 iomapbmap+0x124/0x150 ext4bmap+0x14f/0x250 bmap+0x55/0x80 dovfs_ioctl+0x952/0xbd0 __x64sysioctl+0xc6/0x170 dosyscall64+0x33/0x40 entrySYSCALL64afterhwframe+0x44/0xa9

Above issue may happen as follows: bmap write bmap ext4bmap iomapbmap ext4iomapbegin ext4filewriteiter ext4bufferedwriteiter genericperformwrite ext4dawritebegin ext4dawriteinlinedatabegin ext4prepareinlinedata ext4createinlinedata ext4setinodeflag(inode, EXT4INODEINLINEDATA); if (WARNONONCE(ext4hasinlinedata(inode))) ->trigger bugon

To solved above issue hold inode lock in ext4_bamp.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50082.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ac58e4fb03f9d111d733a4ad379d06eef3a24705
Fixed
e1682c7171a6c0ff576fe8116b8cba5b8f538b94
Fixed
30dfb75e1f8645404a536c74d468d498adcd4e74
Fixed
a9fe6d1e3d343d7309f501b1f48020ce7127221f
Fixed
fa6482f374fda29a71ad44d76d35b4842d43cda4
Fixed
51ae846cff568c8c29921b1b28eb2dfbcd4ac12d

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50082.json"