CVE-2022-50753Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to do sanity check on summary info As Wenqing Liu reported in bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=216456 BUG: KASAN: use-after-free in recover_data+0x63ae/0x6ae0 [f2fs] Read of size 4 at addr ffff8881464dcd80 by task mount/1013 CPU: 3 PID: 1013 Comm: mount Tainted: G W 6.0.0-rc4 #1 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014 Call Trace: dump_stack_lvl+0x45/0x5e pr

Affected Packages4 packages

Linuxlinux/linux_kernel3.11.05.4.220+4
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linuxb292dcab068e141d8a820b77cbcc88d98c610eb4c99860f9a75079f339ed7670425b1ac58f26e2ff+6
debiandebian/linux< linux 6.0.3-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2022-50753: In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to do sanity check on summary info As Wenqing Liu reported in bugzilla:2025-12-24
GHSA
GHSA-83fq-277g-4r9j: In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to do sanity check on summary info As Wenqing Liu reported in bugzilla2025-12-24
OSV
f2fs: fix to do sanity check on summary info2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: f2fs: fix to do sanity check on summary info2025-12-24
Debian
CVE-2022-50753: linux - In the Linux kernel, the following vulnerability has been resolved: f2fs: fix t...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50753 Impact, Exploitability, and Mitigation Steps | Wiz