CVE-2022-50478
BaseFortify
Publication date: 2025-10-04
Last updated on: 2025-10-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's nilfs2 filesystem code, specifically in the nilfs_sb2_bad_offset() function. If the block size exponent information in the on-disk superblock is corrupted, it can cause a shift-out-of-bounds operation leading to a kernel panic when mounting the filesystem. The issue arises because the function performs bit-shifting and multiplication without proper bounds checking, which can cause overflow or invalid operations. The patch fixes this by adding sanity checks and changing the calculations to prevent these out-of-bounds shifts and overflows.
How can this vulnerability impact me? :
This vulnerability can cause a kernel panic during the mounting of a nilfs2 filesystem if the superblock data is corrupted. This can lead to system instability or denial of service, as the kernel may crash or halt unexpectedly when accessing the affected filesystem.