CVE-2022-50436

Source
https://cve.org/CVERecord?id=CVE-2022-50436
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50436.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50436
Downstream
Related
Published
2025-10-01T11:42:13.538Z
Modified
2026-04-02T08:28:30.521332Z
Summary
ext4: don't set up encryption key during jbd2 transaction
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: don't set up encryption key during jbd2 transaction

Commit a80f7fcf1867 ("ext4: fixup ext4fctrack_* functions' signature") extended the scope of the transaction in ext4unlink() too far, making it include the call to ext4findentry(). However, ext4find_entry() can deadlock when called from within a transaction because it may need to set up the directory's encryption key.

Fix this by restoring the transaction to its original scope.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50436.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a80f7fcf18672ae4971a6b713b58c0d389aa99fe
Fixed
23ad034760dd38e12b0e0e1b28b9629f330810a1
Fixed
6220ec405571ded17efedc56587190b542adf246
Fixed
206dd3acfb9bca54a25b228c7c7c2257eedde09b
Fixed
1ba993208bcfd691e241483420a2a761d3f15750
Fixed
4c0d5778385cb3618ff26a561ce41de2b7d9de70

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50436.json"