-
CVE-2022-50519
- EPSS -
- Published 07.10.2025 15:19:13
- Last modified 07.10.2025 16:15:35
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure If creation or finalization of a checkpoint fails due to anomalies in the checkpoint metadata on disk, a kernel warning is generated. This patch replaces the WARN_ONs by nilfs_error, so that a kernel, booted with panic_on_warn, does not panic. A nilfs_error is appropriate here to handle the abnormal filesystem condition. This also replaces the detected error codes with an I/O error so that neither of the internal error codes is returned to callers.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
b63026b5e13040cd5afa11769dd0d9e1504b031a
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
ae16440c44ae2acda6d72aff9d74eccf8967dae5
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
bf98be80cbe3b4e6c86c36ed00457389aca3eb15
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
259c0f68168ac6a598db3486597b10e74d625db0
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
8a18fdc5ae8e6d7ac33c6ee0a2e5f9f1414ef412
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
c0c3d3d3ea41cb5228ee90568bb953f9a56c3227
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
090fcfb6edeb9367a915b2749e2bd1f8b48d8898
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
5c0776b5bc31de7cd28afb558fae37a20f33602e
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
723ac751208f6d6540191689cfbf6c77135a7a1b
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version <=
4.9.*
Version
4.9.331
Status
unaffected
Version <=
4.14.*
Version
4.14.296
Status
unaffected
Version <=
4.19.*
Version
4.19.262
Status
unaffected
Version <=
5.4.*
Version
5.4.218
Status
unaffected
Version <=
5.10.*
Version
5.10.148
Status
unaffected
Version <=
5.15.*
Version
5.15.74
Status
unaffected
Version <=
5.19.*
Version
5.19.16
Status
unaffected
Version <=
6.0.*
Version
6.0.2
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|