{
  "threat_severity" : "Low",
  "public_date" : "2025-12-24T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: ext4: silence the warning when evicting inode with dioread_nolock",
    "id" : "2425043",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2425043"
  },
  "cvss3" : {
    "cvss3_base_score" : "3.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-367",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\next4: silence the warning when evicting inode with dioread_nolock\nWhen evicting an inode with default dioread_nolock, it could be raced by\nthe unwritten extents converting kworker after writeback some new\nallocated dirty blocks. It convert unwritten extents to written, the\nextents could be merged to upper level and free extent blocks, so it\ncould mark the inode dirty again even this inode has been marked\nI_FREEING. But the inode->i_io_list check and warning in\next4_evict_inode() missing this corner case. Fortunately,\next4_evict_inode() will wait all extents converting finished before this\ncheck, so it will not lead to inode use-after-free problem, every thing\nis OK besides this warning. The WARN_ON_ONCE was originally designed\nfor finding inode use-after-free issues in advance, but if we add\ncurrent dioread_nolock case in, it will become not quite useful, so fix\nthis warning by just remove this check.\n======\nWARNING: CPU: 7 PID: 1092 at fs/ext4/inode.c:227\next4_evict_inode+0x875/0xc60\n...\nRIP: 0010:ext4_evict_inode+0x875/0xc60\n...\nCall Trace:\n<TASK>\nevict+0x11c/0x2b0\niput+0x236/0x3a0\ndo_unlinkat+0x1b4/0x490\n__x64_sys_unlinkat+0x4c/0xb0\ndo_syscall_64+0x3b/0x90\nentry_SYSCALL_64_after_hwframe+0x46/0xb0\nRIP: 0033:0x7fa933c1115b\n======\nrm                          kworker\next4_end_io_end()\nvfs_unlink()\next4_unlink()\next4_convert_unwritten_io_end_vec()\next4_convert_unwritten_extents()\next4_map_blocks()\next4_ext_map_blocks()\next4_ext_try_to_merge_up()\n__mark_inode_dirty()\ncheck !I_FREEING\nlocked_inode_to_wb_and_lock_list()\niput()\niput_final()\nevict()\next4_evict_inode()\ntruncate_inode_pages_final() //wait release io_end\ninode_io_list_move_locked()\next4_release_io_end()\ntrigger WARN_ON_ONCE()" ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-05-22T00:00:00Z",
    "advisory" : "RHSA-2024:3138",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "kernel-0:4.18.0-553.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-09T00:00:00Z",
    "advisory" : "RHSA-2023:2458",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-284.11.1.el9_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-09T00:00:00Z",
    "advisory" : "RHSA-2023:2458",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-284.11.1.el9_2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-50730\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-50730\nhttps://lore.kernel.org/linux-cve-announce/2025122420-CVE-2022-50730-a4ca@gregkh/T" ],
  "name" : "CVE-2022-50730",
  "csaw" : false
}