CVE-2022-50668
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a deadlock issue in the Linux kernel's ext4 filesystem related to extended attribute (xattr) blocks. When manipulating xattr blocks, the system can enter an infinite loop inside the ext4_xattr_block_set() function because it keeps trying to reuse an xattr block from the mbcache, but cannot do so due to an inconsistent reference count. This inconsistency arises because the cache entry is marked as reusable (e_reusable bit set) even though its reference count is too high. The root cause is a race condition during non-atomic updates of the e_reusable bit, which is part of a bitfield that can be updated concurrently with the e_referenced bit, leading to lost updates and an inconsistent state that causes the deadlock.
How can this vulnerability impact me? :
This vulnerability can cause the ext4 filesystem to deadlock indefinitely when manipulating extended attribute blocks, potentially leading to system hangs or unresponsiveness. This can affect system stability and availability, especially on systems relying on ext4 with extended attributes.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the ext4 deadlock due to mbcache entry corruption. The fix involves using atomic bit operations to update the e_reusable bit, preventing the inconsistent state that causes the deadlock.