CVE-2022-50668Incorrect Synchronization in Linux

Severity
4.7MEDIUM
No vector
EPSS
0.0%
top 85.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: ext4: fix deadlock due to mbcache entry corruption When manipulating xattr blocks, we can deadlock infinitely looping inside ext4_xattr_block_set() where we constantly keep finding xattr block for reuse in mbcache but we are unable to reuse it because its reference count is too big. This happens because cache entry for the xattr block is marked as reusable (e_reusable set) although its reference count is too big. When this inc

Affected Packages4 packages

Linuxlinux/linux_kernel4.6.04.19.270+5
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux6048c64b26097a0ffbd966866b599f990e674e9befaa0ca678f56d47316a08030b2515678cebbc50+7
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
OSV
ext4: fix deadlock due to mbcache entry corruption2025-12-09
GHSA
GHSA-22wc-8hcq-634h: In the Linux kernel, the following vulnerability has been resolved: ext4: fix deadlock due to mbcache entry corruption When manipulating xattr block2025-12-09
OSV
CVE-2022-50668: In the Linux kernel, the following vulnerability has been resolved: ext4: fix deadlock due to mbcache entry corruption When manipulating xattr blocks,2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: ext4: fix deadlock due to mbcache entry corruption2025-12-09
Debian
CVE-2022-50668: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: fix d...2022