CVE-2022-49364
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
21/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: fix to clear dirty inode in f2fs_evict_inode()<br />
<br />
As Yanming reported in bugzilla:<br />
<br />
https://bugzilla.kernel.org/show_bug.cgi?id=215904<br />
<br />
The kernel message is shown below:<br />
<br />
kernel BUG at fs/f2fs/inode.c:825!<br />
Call Trace:<br />
evict+0x282/0x4e0<br />
__dentry_kill+0x2b2/0x4d0<br />
shrink_dentry_list+0x17c/0x4f0<br />
shrink_dcache_parent+0x143/0x1e0<br />
do_one_tree+0x9/0x30<br />
shrink_dcache_for_umount+0x51/0x120<br />
generic_shutdown_super+0x5c/0x3a0<br />
kill_block_super+0x90/0xd0<br />
kill_f2fs_super+0x225/0x310<br />
deactivate_locked_super+0x78/0xc0<br />
cleanup_mnt+0x2b7/0x480<br />
task_work_run+0xc8/0x150<br />
exit_to_user_mode_prepare+0x14a/0x150<br />
syscall_exit_to_user_mode+0x1d/0x40<br />
do_syscall_64+0x48/0x90<br />
<br />
The root cause is: inode node and dnode node share the same nid,<br />
so during f2fs_evict_inode(), dnode node truncation will invalidate<br />
its NAT entry, so when truncating inode node, it fails due to<br />
invalid NAT entry, result in inode is still marked as dirty, fix<br />
this issue by clearing dirty for inode and setting SBI_NEED_FSCK<br />
flag in filesystem.<br />
<br />
output from dump.f2fs:<br />
[print_node_info: 354] Node ID [0xf:15] is inode<br />
i_nid[0] [0x f : 15]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.8 (including) | 5.4.198 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.121 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.46 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.17.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18 (including) | 5.18.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/03c9373b15fa1c245ec99b2b5e7ba209eae4ef42
- https://git.kernel.org/stable/c/54c116615c99e22aa08aa950757ed726e2f60821
- https://git.kernel.org/stable/c/c469953917b319d415fd621b9e5d0ea5203565cd
- https://git.kernel.org/stable/c/c9196d21359be8c7ee231029d13682273925fd00
- https://git.kernel.org/stable/c/ccd58045beb997544b94558a9156be4742628491
- https://git.kernel.org/stable/c/f2db71053dc0409fae785096ad19cce4c8a95af7



