CVE-2022-50753
Use-After-Free in Linux Kernel f2fs Causes Mount Crash
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's f2fs filesystem, specifically in the recover_data function. It occurs because the SSA table's summary info can be corrupted, leading to an out-of-range access when an offset in a node is larger than the allowed maximum. This causes the kernel to read invalid memory, potentially leading to crashes or other unexpected behavior. The patch adds sanity checks on the summary info during recovery and garbage collection to prevent this out-of-range access.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to perform out-of-range memory reads, leading to use-after-free errors. This may result in system crashes, instability, or potential exploitation by attackers to execute arbitrary code or cause denial of service.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for messages indicating inconsistent summary info in the f2fs filesystem, such as the log message: 'F2FS-fs (loop0): Inconsistent ofs_in_node:... in summary'. You can check kernel logs using commands like 'dmesg | grep F2FS-fs' or 'journalctl -k | grep F2FS-fs' to identify such sanity check failures.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves applying the patch that adds sanity checks on summary info in the f2fs recovery and garbage collection flows. Until the patch is applied, avoid mounting or using potentially corrupted f2fs images that could trigger the vulnerability.