CVE-2022-50864Linux vulnerability

8 documents7 sources
Severity
7.5HIGH
No vector
EPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix shift-out-of-bounds due to too large exponent of block size If field s_log_block_size of superblock data is corrupted and too large, init_nilfs() and load_nilfs() still can trigger a shift-out-of-bounds warning followed by a kernel panic (if panic_on_warn is set): shift exponent 38973 is too large for 32-bit type 'int' Call Trace: dump_stack_lvl+0xcd/0x134 ubsan_epilogue+0xb/0x50 __ubsan_handle_shift_out_of_bound

Affected Packages4 packages

Linuxlinux/linux_kernel2.6.305.10.163+3
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux8a9d2191e9f43bbcd256a9a6871bd73434c83f2fec93b5430ec0f60877a5388bb023d60624f9ab9f+5
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2022-50864: In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix shift-out-of-bounds due to too large exponent of block size If field s2025-12-30
OSV
nilfs2: fix shift-out-of-bounds due to too large exponent of block size2025-12-30
GHSA
GHSA-gfhq-qmg6-x4ch: In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix shift-out-of-bounds due to too large exponent of block size If field2025-12-30

💥Exploits & PoCs

1
Nuclei
Razer Sila Gaming Router 2.0.441_api-2.0.418 - Local File Inclusion

📋Vendor Advisories

2
Red Hat
kernel: nilfs2: fix shift-out-of-bounds due to too large exponent of block size2025-12-30
Debian
CVE-2022-50864: linux - In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50864 Impact, Exploitability, and Mitigation Steps | Wiz