CVE-2022-50013
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a bug in the Linux kernel's f2fs filesystem related to the function f2fs_new_node_page. The issue arises when the NAT entry and NAT bitmap become inconsistent, such that a node ID (nid) is marked as free in the NAT bitmap but its corresponding NAT entry's block address is not NULL_ADDR. This inconsistency can trigger a kernel BUG_ON() error, causing a crash or instability. The fix prevents this inconsistent state from causing the bug.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to crash or become unstable due to the BUG_ON() triggered by the inconsistent NAT entry and bitmap in the f2fs filesystem. This can lead to system downtime, data loss, or corruption if the filesystem is in use when the bug is triggered.