-

CVE-2022-50436

In the Linux kernel, the following vulnerability has been resolved:

ext4: don't set up encryption key during jbd2 transaction

Commit a80f7fcf1867 ("ext4: fixup ext4_fc_track_* functions' signature")
extended the scope of the transaction in ext4_unlink() too far, making
it include the call to ext4_find_entry().  However, ext4_find_entry()
can deadlock when called from within a transaction because it may need
to set up the directory's encryption key.

Fix this by restoring the transaction to its original scope.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 23ad034760dd38e12b0e0e1b28b9629f330810a1
Version a80f7fcf18672ae4971a6b713b58c0d389aa99fe
Status affected
Version < 6220ec405571ded17efedc56587190b542adf246
Version a80f7fcf18672ae4971a6b713b58c0d389aa99fe
Status affected
Version < 206dd3acfb9bca54a25b228c7c7c2257eedde09b
Version a80f7fcf18672ae4971a6b713b58c0d389aa99fe
Status affected
Version < 1ba993208bcfd691e241483420a2a761d3f15750
Version a80f7fcf18672ae4971a6b713b58c0d389aa99fe
Status affected
Version < 4c0d5778385cb3618ff26a561ce41de2b7d9de70
Version a80f7fcf18672ae4971a6b713b58c0d389aa99fe
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.10
Status affected
Version < 5.10
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.87
Status unaffected
Version <= 6.0.*
Version 6.0.18
Status unaffected
Version <= 6.1.*
Version 6.1.4
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.01% 0.016
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string