{"id":"CVE-2022-50638","summary":"ext4: fix bug_on in __es_tree_search caused by bad boot loader inode","details":"In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix bug_on in __es_tree_search caused by bad boot loader inode\n\nWe got a issue as fllows:\n==================================================================\n kernel BUG at fs/ext4/extents_status.c:203!\n invalid opcode: 0000 [#1] PREEMPT SMP\n CPU: 1 PID: 945 Comm: cat Not tainted 6.0.0-next-20221007-dirty #349\n RIP: 0010:ext4_es_end.isra.0+0x34/0x42\n RSP: 0018:ffffc9000143b768 EFLAGS: 00010203\n RAX: 0000000000000000 RBX: ffff8881769cd0b8 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: ffffffff8fc27cf7 RDI: 00000000ffffffff\n RBP: ffff8881769cd0bc R08: 0000000000000000 R09: ffffc9000143b5f8\n R10: 0000000000000001 R11: 0000000000000001 R12: ffff8881769cd0a0\n R13: ffff8881768e5668 R14: 00000000768e52f0 R15: 0000000000000000\n FS: 00007f359f7f05c0(0000)GS:ffff88842fd00000(0000)knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f359f5a2000 CR3: 000000017130c000 CR4: 00000000000006e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n  \u003cTASK\u003e\n  __es_tree_search.isra.0+0x6d/0xf5\n  ext4_es_cache_extent+0xfa/0x230\n  ext4_cache_extents+0xd2/0x110\n  ext4_find_extent+0x5d5/0x8c0\n  ext4_ext_map_blocks+0x9c/0x1d30\n  ext4_map_blocks+0x431/0xa50\n  ext4_mpage_readpages+0x48e/0xe40\n  ext4_readahead+0x47/0x50\n  read_pages+0x82/0x530\n  page_cache_ra_unbounded+0x199/0x2a0\n  do_page_cache_ra+0x47/0x70\n  page_cache_ra_order+0x242/0x400\n  ondemand_readahead+0x1e8/0x4b0\n  page_cache_sync_ra+0xf4/0x110\n  filemap_get_pages+0x131/0xb20\n  filemap_read+0xda/0x4b0\n  generic_file_read_iter+0x13a/0x250\n  ext4_file_read_iter+0x59/0x1d0\n  vfs_read+0x28f/0x460\n  ksys_read+0x73/0x160\n  __x64_sys_read+0x1e/0x30\n  do_syscall_64+0x35/0x80\n  entry_SYSCALL_64_after_hwframe+0x63/0xcd\n  \u003c/TASK\u003e\n==================================================================\n\nIn the above issue, ioctl invokes the swap_inode_boot_loader function to\nswap inode\u003c5\u003e and inode\u003c12\u003e. However, inode\u003c5\u003e contain incorrect imode and\ndisordered extents, and i_nlink is set to 1. The extents check for inode in\nthe ext4_iget function can be bypassed bacause 5 is EXT4_BOOT_LOADER_INO.\nWhile links_count is set to 1, the extents are not initialized in\nswap_inode_boot_loader. After the ioctl command is executed successfully,\nthe extents are swapped to inode\u003c12\u003e, in this case, run the `cat` command\nto view inode\u003c12\u003e. And Bug_ON is triggered due to the incorrect extents.\n\nWhen the boot loader inode is not initialized, its imode can be one of the\nfollowing:\n1) the imode is a bad type, which is marked as bad_inode in ext4_iget and\n   set to S_IFREG.\n2) the imode is good type but not S_IFREG.\n3) the imode is S_IFREG.\n\nThe BUG_ON may be triggered by bypassing the check in cases 1 and 2.\nTherefore, when the boot loader inode is bad_inode or its imode is not\nS_IFREG, initialize the inode to avoid triggering the BUG.","modified":"2026-03-20T12:22:36.693169Z","published":"2025-12-09T00:00:11.665Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0316-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50638.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/5f8d36abd2059bf1bd016b17d1fe78d8613deddd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/71e99ec1315fe98d322b17b9a28f204aaf15ffee"},{"type":"WEB","url":"https://git.kernel.org/stable/c/78e335fb573e6a85718c4c24d5a052718a99a9ed"},{"type":"WEB","url":"https://git.kernel.org/stable/c/991ed014de0840c5dc405b679168924afb2952ac"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a125c8806b7d3c3815b6f9f59d395b9d7527b0ef"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a95ba369255ddcdc5e43d38bc5203537bdf3a518"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d480a49c15c465cb9a16db1379f4996e9b5bb9cc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e76ede9d2c9e0af4573342b56d7cdbf757c18084"},{"type":"WEB","url":"https://git.kernel.org/stable/c/feec0ea94c5ef4aa118750284c8a921698733ef2"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50638.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50638"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"393d1d1d76933886d5e1ce603214c9987589c6d5"},{"fixed":"e76ede9d2c9e0af4573342b56d7cdbf757c18084"},{"fixed":"a95ba369255ddcdc5e43d38bc5203537bdf3a518"},{"fixed":"5f8d36abd2059bf1bd016b17d1fe78d8613deddd"},{"fixed":"78e335fb573e6a85718c4c24d5a052718a99a9ed"},{"fixed":"71e99ec1315fe98d322b17b9a28f204aaf15ffee"},{"fixed":"d480a49c15c465cb9a16db1379f4996e9b5bb9cc"},{"fixed":"feec0ea94c5ef4aa118750284c8a921698733ef2"},{"fixed":"a125c8806b7d3c3815b6f9f59d395b9d7527b0ef"},{"fixed":"991ed014de0840c5dc405b679168924afb2952ac"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50638.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.10.0"},{"fixed":"4.9.337"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.10.0"},{"fixed":"4.14.303"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.270"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.229"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.163"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.87"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.18"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.1.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50638.json"}}],"schema_version":"1.7.5"}