CVE-2022-48877
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/08/2024
Last modified:
05/09/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: let&#39;s avoid panic if extent_tree is not created<br />
<br />
This patch avoids the below panic.<br />
<br />
pc : __lookup_extent_tree+0xd8/0x760<br />
lr : f2fs_do_write_data_page+0x104/0x87c<br />
sp : ffffffc010cbb3c0<br />
x29: ffffffc010cbb3e0 x28: 0000000000000000<br />
x27: ffffff8803e7f020 x26: ffffff8803e7ed40<br />
x25: ffffff8803e7f020 x24: ffffffc010cbb460<br />
x23: ffffffc010cbb480 x22: 0000000000000000<br />
x21: 0000000000000000 x20: ffffffff22e90900<br />
x19: 0000000000000000 x18: ffffffc010c5d080<br />
x17: 0000000000000000 x16: 0000000000000020<br />
x15: ffffffdb1acdbb88 x14: ffffff888759e2b0<br />
x13: 0000000000000000 x12: ffffff802da49000<br />
x11: 000000000a001200 x10: ffffff8803e7ed40<br />
x9 : ffffff8023195800 x8 : ffffff802da49078<br />
x7 : 0000000000000001 x6 : 0000000000000000<br />
x5 : 0000000000000006 x4 : ffffffc010cbba28<br />
x3 : 0000000000000000 x2 : ffffffc010cbb480<br />
x1 : 0000000000000000 x0 : ffffff8803e7ed40<br />
Call trace:<br />
__lookup_extent_tree+0xd8/0x760<br />
f2fs_do_write_data_page+0x104/0x87c<br />
f2fs_write_single_data_page+0x420/0xb60<br />
f2fs_write_cache_pages+0x418/0xb1c<br />
__f2fs_write_data_pages+0x428/0x58c<br />
f2fs_write_data_pages+0x30/0x40<br />
do_writepages+0x88/0x190<br />
__writeback_single_inode+0x48/0x448<br />
writeback_sb_inodes+0x468/0x9e8<br />
__writeback_inodes_wb+0xb8/0x2a4<br />
wb_writeback+0x33c/0x740<br />
wb_do_writeback+0x2b4/0x400<br />
wb_workfn+0xe4/0x34c<br />
process_one_work+0x24c/0x5bc<br />
worker_thread+0x3e8/0xa50<br />
kthread+0x150/0x1b4
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14.304 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.271 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.230 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.165 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.90 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.8 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1c38cdc747f00daf7394535eae5afc4c503c59bb
- https://git.kernel.org/stable/c/2c129e868992621a739bdd57a5bffa3985ef1b91
- https://git.kernel.org/stable/c/557e85ff9afef6d45020b6f09357111d38033c31
- https://git.kernel.org/stable/c/72009139a661ade5cb1da4239734ed02fa1cfff0
- https://git.kernel.org/stable/c/dd83a9763e29ed7a21c8a43f7a62cd0a6bf74692
- https://git.kernel.org/stable/c/df9d44b645b83fffccfb4e28c1f93376585fdec8
- https://git.kernel.org/stable/c/ff85a1dbd90d29f73033177ff8d8de4a27d9721c



