CVE-2022-50277
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.18 (inc) to 6.0.18 (exc) |
| linux | linux_kernel | From 6.1 (inc) to 6.1.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's ext4 filesystem when mounting a filesystem whose journal inode has the encrypt flag set and the 'inlinecrypt' mount option is used. The issue causes a NULL pointer dereference in the function fscrypt_limit_io_blocks() because the journal inode is not properly initialized with an encryption key as a normal file would be. This leads to a crash when the kernel tries to handle the encrypted journal inode incorrectly.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (NULL pointer dereference) when mounting an ext4 filesystem with an encrypted journal inode and the 'inlinecrypt' option. This can lead to system instability or denial of service due to the kernel crash.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that your ext4 filesystem does not have the journal inode with the encrypt flag set. Avoid mounting ext4 filesystems with the 'inlinecrypt' option if the journal inode is improperly flagged. Applying the patch or update that rejects journal inodes with the encrypt flag is recommended to prevent the NULL dereference crash.