CVE-2022-50546
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.10.163 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-908 | The product uses or accesses a resource that has not been initialized. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a bug in the Linux kernel's ext4 filesystem code where an uninitialized value in the 'i_flags' field of an inode structure can be accessed. Specifically, the function ext4_alloc_inode() did not initialize 'ei->i_flags'. If creating a new inode failed before 'i_flags' was set in __ext4_new_inode(), the cleanup function iput() would be called. After a certain commit, ext4_evict_inode() accesses 'ei->i_flags', leading to use of an uninitialized value, which can cause undefined behavior or system instability. The fix was to initialize 'ei->i_flags' properly in ext4_alloc_inode().
How can this vulnerability impact me? :
This vulnerability can lead to undefined behavior in the Linux kernel, such as system instability or crashes, because it involves accessing uninitialized memory in the ext4 filesystem code. While the exact impact depends on how the kernel and filesystem are used, it could potentially cause system errors or data corruption during inode operations.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Linux kernel to a version that includes the fix for the uninitialized value in ext4_evict_inode, specifically where 'ei->i_flags' is initialized in ext4_alloc_inode(). Applying the latest kernel patches or upgrading to a fixed kernel version is recommended.