0.0
NA
CVE-2022-50403
ext4: fix undefined behavior in bit shift for ext4_check_flag_values
Description

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

INFO

Published Date :

Sept. 18, 2025, 4:15 p.m.

Last Modified :

Sept. 22, 2025, 8:15 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2022-50403 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
Solution
Update the Linux kernel to resolve undefined behavior in bit shift operations within ext4.
  • Update the Linux kernel to the latest version.
  • Apply the specific patch for ext4 bit shift fix.
  • Recompile the kernel if necessary.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-50403 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-50403 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Rejected by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Sep. 22, 2025

    Action Type Old Value New Value
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Sep. 22, 2025

    Action Type Old Value New Value
    Changed Description In the Linux kernel, the following vulnerability has been resolved: ext4: fix undefined behavior in bit shift for ext4_check_flag_values Shifting signed 32-bit value by 31 bits is undefined, so changing significant bit to unsigned. The UBSAN warning calltrace like below: UBSAN: shift-out-of-bounds in fs/ext4/ext4.h:591:2 left shift of 1 by 31 places cannot be represented in type 'int' Call Trace: <TASK> dump_stack_lvl+0x7d/0xa5 dump_stack+0x15/0x1b ubsan_epilogue+0xe/0x4e __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c ext4_init_fs+0x5a/0x277 do_one_initcall+0x76/0x430 kernel_init_freeable+0x3b3/0x422 kernel_init+0x24/0x1e0 ret_from_fork+0x1f/0x30 </TASK> Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    Removed Reference kernel.org: https://git.kernel.org/stable/c/205ac16628aca9093931fcbdb4bcd00d0eb94132
    Removed Reference kernel.org: https://git.kernel.org/stable/c/3bf678a0f9c017c9ba7c581541dbc8453452a7ae
    Removed Reference kernel.org: https://git.kernel.org/stable/c/4690a4bdcf1470cb161aff1be30bd143b9dffd89
    Removed Reference kernel.org: https://git.kernel.org/stable/c/5da9e607547f73dc7a643f35b0487992fd66910f
    Removed Reference kernel.org: https://git.kernel.org/stable/c/743e9d708743d98464ccbd56e820d87dc6d1d629
    Removed Reference kernel.org: https://git.kernel.org/stable/c/7753d6657873a2523a9989e6c09090cd503bbcda
    Removed Reference kernel.org: https://git.kernel.org/stable/c/d7f93fc6fba8ff017be871be7edf8614a785ccad
    Removed Reference kernel.org: https://git.kernel.org/stable/c/dd5639d36a5e4e42fd0fe05cc0b2ad9ddd3fca9d
    Removed Reference kernel.org: https://git.kernel.org/stable/c/f9cd6980800bbfd11bf94eb5f942049d4d4eaa52
  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Sep. 18, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: ext4: fix undefined behavior in bit shift for ext4_check_flag_values Shifting signed 32-bit value by 31 bits is undefined, so changing significant bit to unsigned. The UBSAN warning calltrace like below: UBSAN: shift-out-of-bounds in fs/ext4/ext4.h:591:2 left shift of 1 by 31 places cannot be represented in type 'int' Call Trace: <TASK> dump_stack_lvl+0x7d/0xa5 dump_stack+0x15/0x1b ubsan_epilogue+0xe/0x4e __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c ext4_init_fs+0x5a/0x277 do_one_initcall+0x76/0x430 kernel_init_freeable+0x3b3/0x422 kernel_init+0x24/0x1e0 ret_from_fork+0x1f/0x30 </TASK>
    Added Reference https://git.kernel.org/stable/c/205ac16628aca9093931fcbdb4bcd00d0eb94132
    Added Reference https://git.kernel.org/stable/c/3bf678a0f9c017c9ba7c581541dbc8453452a7ae
    Added Reference https://git.kernel.org/stable/c/4690a4bdcf1470cb161aff1be30bd143b9dffd89
    Added Reference https://git.kernel.org/stable/c/5da9e607547f73dc7a643f35b0487992fd66910f
    Added Reference https://git.kernel.org/stable/c/743e9d708743d98464ccbd56e820d87dc6d1d629
    Added Reference https://git.kernel.org/stable/c/7753d6657873a2523a9989e6c09090cd503bbcda
    Added Reference https://git.kernel.org/stable/c/d7f93fc6fba8ff017be871be7edf8614a785ccad
    Added Reference https://git.kernel.org/stable/c/dd5639d36a5e4e42fd0fe05cc0b2ad9ddd3fca9d
    Added Reference https://git.kernel.org/stable/c/f9cd6980800bbfd11bf94eb5f942049d4d4eaa52
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
No CVSS metrics available for this vulnerability.