{"id":"CVE-2022-50020","summary":"ext4: avoid resizing to a partial cluster size","details":"In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid resizing to a partial cluster size\n\nThis patch avoids an attempt to resize the filesystem to an\nunaligned cluster boundary.  An online resize to a size that is not\nintegral to cluster size results in the last iteration attempting to\ngrow the fs by a negative amount, which trips a BUG_ON and leaves the fs\nwith a corrupted in-memory superblock.","modified":"2026-04-03T13:14:41.727046Z","published":"2025-06-18T11:01:24.227Z","related":["ALSA-2025:12752","ALSA-2025:12753","SUSE-SU-2025:02264-1","SUSE-SU-2025:02308-1","SUSE-SU-2025:02320-1","SUSE-SU-2025:02321-1","SUSE-SU-2025:02322-1","SUSE-SU-2025:02334-1","SUSE-SU-2025:02537-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50020.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0082e99a9074ff88eff729c70c93454c8588d8e1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/69cb8e9d8cd97cdf5e293b26d70a9dee3e35e6bd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/72b850a2a996f72541172e7cf686d54a2b29bcd8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7bdfb01fc5f6b3696728aeb527c50386e0ee09a1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/80288883294c5b4ed18bae0d8bd9c4a12f297074"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a6805b3dcf5cd41f2ae3a03dca43411135b99849"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50020.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50020"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d77147ff443b255d82c907a632c825b2cc610b10"},{"fixed":"7bdfb01fc5f6b3696728aeb527c50386e0ee09a1"},{"fixed":"a6805b3dcf5cd41f2ae3a03dca43411135b99849"},{"fixed":"80288883294c5b4ed18bae0d8bd9c4a12f297074"},{"fixed":"72b850a2a996f72541172e7cf686d54a2b29bcd8"},{"fixed":"0082e99a9074ff88eff729c70c93454c8588d8e1"},{"fixed":"69cb8e9d8cd97cdf5e293b26d70a9dee3e35e6bd"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50020.json"}}],"schema_version":"1.7.5"}