CVE-2022-50273
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 3.8 (inc) to 5.4.220 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.150 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.75 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 5.19.17 (exc) |
| linux | linux_kernel | From 6.0 (inc) to 6.0.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's F2FS filesystem. It involves an inconsistency between the SIT (Segment Information Table) and the inode mapping table during recovery, which can cause warnings or kernel panic if CONFIG_F2FS_CHECK_FS is enabled. The issue arises because the destination block address (blkaddr) is not properly sanity-checked during recovery, leading to potential inconsistent filesystem states. The patch fixes this by adding a flag that enables validation of the destination block address to avoid replacing blocks incorrectly.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to issue warnings or even panic (crash) during filesystem recovery on F2FS filesystems. This can lead to system instability or downtime, especially if the filesystem is mounted with the CONFIG_F2FS_CHECK_FS option enabled. It may also result in inconsistent filesystem states, potentially causing data corruption or loss.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for specific warnings related to the f2fs filesystem, such as messages indicating inconsistent SIT table updates or warnings like 'Bitmap was wrongly set, blk:xxxx' and call traces involving f2fs functions (e.g., update_sit_entry, f2fs_replace_block). Enabling CONFIG_F2FS_CHECK_FS in the kernel configuration can cause a kernel panic on detection, which is a strong indicator. Commands to check kernel logs include: 'dmesg | grep f2fs' or 'journalctl -k | grep f2fs'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves applying the patch that introduces the DATA_GENERIC_ENHANCE_UPDATE flag, which adds validation checks on destination block addresses during data block recovery to avoid inconsistent states. Additionally, enabling CONFIG_F2FS_CHECK_FS can help detect the issue early by triggering a kernel panic instead of a warning. Updating the Linux kernel to a version that includes this fix is the recommended step.