CVE-2022-50730 — Time-of-check Time-of-use (TOCTOU) Race Condition in Linux
Severity
3.3LOW
No vectorEPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
ext4: silence the warning when evicting inode with dioread_nolock
When evicting an inode with default dioread_nolock, it could be raced by
the unwritten extents converting kworker after writeback some new
allocated dirty blocks. It convert unwritten extents to written, the
extents could be merged to upper level and free extent blocks, so it
could mark the inode dirty again even this inode has been marked
I_FREEING. But the ino…
Affected Packages4 packages
▶CVEListV5linux/linuxceff86fddae8748fe00d4f2d249cb02cae62ad84 — bdc698ce91f232fd5eb11d2373e9f82f687314b8+5
🔴Vulnerability Details
3OSV▶
CVE-2022-50730: In the Linux kernel, the following vulnerability has been resolved: ext4: silence the warning when evicting inode with dioread_nolock When evicting an↗2025-12-24
GHSA▶
GHSA-m98r-2fg7-rppv: In the Linux kernel, the following vulnerability has been resolved:
ext4: silence the warning when evicting inode with dioread_nolock
When evicting↗2025-12-24