VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2022-50815

CVE-2022-50815

Description

In the Linux kernel, the following vulnerability has been resolved:

ext2: Add sanity checks for group and filesystem size

Add sanity check that filesystem size does not exceed the underlying device size and that group size is big enough so that metadata can fit into it. This avoid trying to mount some crafted filesystems with extremely large group counts.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel ext2 filesystem driver now validates that filesystem size does not exceed device size and that group size is sufficient for metadata, preventing mount of crafted images with excessive group counts.

The Linux kernel's ext2 filesystem driver lacked sanity checks for the relationship between the filesystem size, the underlying device size, and the group descriptor size. When mounting a specially crafted ext2 image where the filesystem size exceeds the device size or where the group size is too small to fit its metadata, the kernel could encounter undefined behavior or attempt to allocate an extremely large number of group descriptors, leading to memory corruption or denial of service. The patch adds checks to ensure the filesystem size does not exceed the device's capacity and that each group has sufficient room for its metadata [1].

Exploitation

An attacker can exploit this by presenting a crafted ext2 filesystem image to a system that attempts to mount it, potentially through a physical device, loopback mount of a file, or via network filesystem if the image is provided remotely. The attack does not require authentication if the user or a privileged process can be tricked into mounting the malicious image. The vulnerability is triggered during the mount operation itself [1].

Impact

Successful exploitation could allow an attacker to cause a denial of service by crashing the system or potentially executing arbitrary code, though the patch notes primarily address preventing memory corruption and resource exhaustion due to extreme group counts. The fix mitigates the risk by rejecting invalid mount requests before any harmful memory allocation occurs [1].

Mitigation

The fix has been applied upstream in the Linux kernel and was included in stable releases. Users should update their kernels to incorporate the commit 40ff52527daec00cf1530c17a95636916ddd3b38. No workarounds are available other than avoiding mounting untrusted ext2 filesystem images on unpatched kernels [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.