CVE-2022-50403
ext4: fix undefined behavior in bit shift for ext4_check_flag_values
Description
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
INFO
Published Date :
Sept. 18, 2025, 4:15 p.m.
Last Modified :
Sept. 22, 2025, 8:15 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Solution
- Update the Linux kernel to the latest version.
- Apply the specific patch for ext4 bit shift fix.
- Recompile the kernel if necessary.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2022-50403 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2022-50403 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Rejected by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Sep. 22, 2025
Action Type Old Value New Value -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Sep. 22, 2025
Action Type Old Value New Value Changed Description In the Linux kernel, the following vulnerability has been resolved: ext4: fix undefined behavior in bit shift for ext4_check_flag_values Shifting signed 32-bit value by 31 bits is undefined, so changing significant bit to unsigned. The UBSAN warning calltrace like below: UBSAN: shift-out-of-bounds in fs/ext4/ext4.h:591:2 left shift of 1 by 31 places cannot be represented in type 'int' Call Trace: <TASK> dump_stack_lvl+0x7d/0xa5 dump_stack+0x15/0x1b ubsan_epilogue+0xe/0x4e __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c ext4_init_fs+0x5a/0x277 do_one_initcall+0x76/0x430 kernel_init_freeable+0x3b3/0x422 kernel_init+0x24/0x1e0 ret_from_fork+0x1f/0x30 </TASK> Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Removed Reference kernel.org: https://git.kernel.org/stable/c/205ac16628aca9093931fcbdb4bcd00d0eb94132 Removed Reference kernel.org: https://git.kernel.org/stable/c/3bf678a0f9c017c9ba7c581541dbc8453452a7ae Removed Reference kernel.org: https://git.kernel.org/stable/c/4690a4bdcf1470cb161aff1be30bd143b9dffd89 Removed Reference kernel.org: https://git.kernel.org/stable/c/5da9e607547f73dc7a643f35b0487992fd66910f Removed Reference kernel.org: https://git.kernel.org/stable/c/743e9d708743d98464ccbd56e820d87dc6d1d629 Removed Reference kernel.org: https://git.kernel.org/stable/c/7753d6657873a2523a9989e6c09090cd503bbcda Removed Reference kernel.org: https://git.kernel.org/stable/c/d7f93fc6fba8ff017be871be7edf8614a785ccad Removed Reference kernel.org: https://git.kernel.org/stable/c/dd5639d36a5e4e42fd0fe05cc0b2ad9ddd3fca9d Removed Reference kernel.org: https://git.kernel.org/stable/c/f9cd6980800bbfd11bf94eb5f942049d4d4eaa52 -
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Sep. 18, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: ext4: fix undefined behavior in bit shift for ext4_check_flag_values Shifting signed 32-bit value by 31 bits is undefined, so changing significant bit to unsigned. The UBSAN warning calltrace like below: UBSAN: shift-out-of-bounds in fs/ext4/ext4.h:591:2 left shift of 1 by 31 places cannot be represented in type 'int' Call Trace: <TASK> dump_stack_lvl+0x7d/0xa5 dump_stack+0x15/0x1b ubsan_epilogue+0xe/0x4e __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c ext4_init_fs+0x5a/0x277 do_one_initcall+0x76/0x430 kernel_init_freeable+0x3b3/0x422 kernel_init+0x24/0x1e0 ret_from_fork+0x1f/0x30 </TASK> Added Reference https://git.kernel.org/stable/c/205ac16628aca9093931fcbdb4bcd00d0eb94132 Added Reference https://git.kernel.org/stable/c/3bf678a0f9c017c9ba7c581541dbc8453452a7ae Added Reference https://git.kernel.org/stable/c/4690a4bdcf1470cb161aff1be30bd143b9dffd89 Added Reference https://git.kernel.org/stable/c/5da9e607547f73dc7a643f35b0487992fd66910f Added Reference https://git.kernel.org/stable/c/743e9d708743d98464ccbd56e820d87dc6d1d629 Added Reference https://git.kernel.org/stable/c/7753d6657873a2523a9989e6c09090cd503bbcda Added Reference https://git.kernel.org/stable/c/d7f93fc6fba8ff017be871be7edf8614a785ccad Added Reference https://git.kernel.org/stable/c/dd5639d36a5e4e42fd0fe05cc0b2ad9ddd3fca9d Added Reference https://git.kernel.org/stable/c/f9cd6980800bbfd11bf94eb5f942049d4d4eaa52