CVE-2022-50730Time-of-check Time-of-use (TOCTOU) Race Condition in Linux

Severity
3.3LOW
No vector
EPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: ext4: silence the warning when evicting inode with dioread_nolock When evicting an inode with default dioread_nolock, it could be raced by the unwritten extents converting kworker after writeback some new allocated dirty blocks. It convert unwritten extents to written, the extents could be merged to upper level and free extent blocks, so it could mark the inode dirty again even this inode has been marked I_FREEING. But the ino

Affected Packages4 packages

Linuxlinux/linux_kernel5.8.05.10.163+3
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linuxceff86fddae8748fe00d4f2d249cb02cae62ad84bdc698ce91f232fd5eb11d2373e9f82f687314b8+5
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2022-50730: In the Linux kernel, the following vulnerability has been resolved: ext4: silence the warning when evicting inode with dioread_nolock When evicting an2025-12-24
OSV
ext4: silence the warning when evicting inode with dioread_nolock2025-12-24
GHSA
GHSA-m98r-2fg7-rppv: In the Linux kernel, the following vulnerability has been resolved: ext4: silence the warning when evicting inode with dioread_nolock When evicting2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: ext4: silence the warning when evicting inode with dioread_nolock2025-12-24
Debian
CVE-2022-50730: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: silen...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50730 Impact, Exploitability, and Mitigation Steps | Wiz