CVE-2022-49318
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
01/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: remove WARN_ON in f2fs_is_valid_blkaddr<br />
<br />
Syzbot triggers two WARNs in f2fs_is_valid_blkaddr and<br />
__is_bitmap_valid. For example, in f2fs_is_valid_blkaddr,<br />
if type is DATA_GENERIC_ENHANCE or DATA_GENERIC_ENHANCE_READ,<br />
it invokes WARN_ON if blkaddr is not in the right range.<br />
The call trace is as follows:<br />
<br />
f2fs_get_node_info+0x45f/0x1070<br />
read_node_page+0x577/0x1190<br />
__get_node_page.part.0+0x9e/0x10e0<br />
__get_node_page<br />
f2fs_get_node_page+0x109/0x180<br />
do_read_inode<br />
f2fs_iget+0x2a5/0x58b0<br />
f2fs_fill_super+0x3b39/0x7ca0<br />
<br />
Fix these two WARNs by replacing WARN_ON with dump_stack.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.198 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.122 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.47 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.17.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18 (including) | 5.18.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0a7a1fc7e71eecf2e5053a6c312c9f0dcbb9b8fd
- https://git.kernel.org/stable/c/32bea51fe4c6e92c00403739f7547c89219bea88
- https://git.kernel.org/stable/c/8c62c5e26345c34d199b4b8c8e69255ba3d0e751
- https://git.kernel.org/stable/c/99c09b298e47ebbe345a6da9f268b32a6b0f4582
- https://git.kernel.org/stable/c/cd6374af36cc548464d8c47a93fdba7303bb82a4
- https://git.kernel.org/stable/c/dc2f78e2d4cc844a1458653d57ce1b54d4a29f21



