CVE-2022-49318

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
01/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> f2fs: remove WARN_ON in f2fs_is_valid_blkaddr<br /> <br /> Syzbot triggers two WARNs in f2fs_is_valid_blkaddr and<br /> __is_bitmap_valid. For example, in f2fs_is_valid_blkaddr,<br /> if type is DATA_GENERIC_ENHANCE or DATA_GENERIC_ENHANCE_READ,<br /> it invokes WARN_ON if blkaddr is not in the right range.<br /> The call trace is as follows:<br /> <br /> f2fs_get_node_info+0x45f/0x1070<br /> read_node_page+0x577/0x1190<br /> __get_node_page.part.0+0x9e/0x10e0<br /> __get_node_page<br /> f2fs_get_node_page+0x109/0x180<br /> do_read_inode<br /> f2fs_iget+0x2a5/0x58b0<br /> f2fs_fill_super+0x3b39/0x7ca0<br /> <br /> Fix these two WARNs by replacing WARN_ON with dump_stack.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.4.198 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.122 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.47 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.17.15 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.18 (including) 5.18.4 (excluding)