CVE-2022-50306
ext4: fix potential out of bound read in ext4_fc_replay_scan()
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: ext4: fix potential out of bound read in ext4_fc_replay_scan() For scan loop must ensure that at least EXT4_FC_TAG_BASE_LEN space. If remain space less than EXT4_FC_TAG_BASE_LEN which will lead to out of bound read when mounting corrupt file system image. ADD_RANGE/HEAD/TAIL is needed to add extra check when do journal scan, as this three tags will read data during scan, tag length couldn't less than data length which will read.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Sep 15, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
8016e29f4362e285f0f7e38fadc61a5b7bdfdfa2 < 6969367c1500c15eddc38fda12f6d15518ad6d03 8016e29f4362e285f0f7e38fadc61a5b7bdfdfa2 < f234294812c9b68d603650d28743eafb718e7ad5 8016e29f4362e285f0f7e38fadc61a5b7bdfdfa2 < 1b45cc5c7b920fd8bf72e5a888ec7abeadf41e09
Linux / Linux
5.10