CVE-2022-50673
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's ext4 filesystem code, specifically in the ext4_orphan_cleanup function. It occurs when the system improperly handles inode structures during cleanup, leading to a situation where a freed inode is accessed again, causing memory corruption or crashes.
How can this vulnerability impact me? :
This vulnerability can cause system instability, crashes, or potential memory corruption when mounting or handling ext4 filesystems. It may lead to denial of service or unexpected behavior in systems using the affected Linux kernel versions.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability is a use-after-free bug in the ext4 filesystem code within the Linux kernel, specifically in ext4_orphan_cleanup. Detection would involve monitoring kernel logs for KASAN (Kernel Address Sanitizer) reports indicating use-after-free errors related to ext4, such as messages containing 'BUG: KASAN: use-after-free in __list_add_valid' or similar stack traces. You can check kernel logs using commands like 'dmesg | grep -i kasan' or 'journalctl -k | grep -i kasan'. Additionally, running the kernel with KASAN enabled can help detect such issues during testing.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this ext4 use-after-free vulnerability has been fixed. Since the issue is in the kernel ext4 code, applying the patch that propagates the return value of ext4_inode_attach_jinode() correctly will resolve the problem. Until then, avoid mounting ext4 filesystems that might trigger this bug, or use alternative filesystems if possible.