CVE-2022-49706

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
26/02/2025
Last modified:
24/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> zonefs: fix zonefs_iomap_begin() for reads<br /> <br /> If a readahead is issued to a sequential zone file with an offset<br /> exactly equal to the current file size, the iomap type is set to<br /> IOMAP_UNWRITTEN, which will prevent an IO, but the iomap length is<br /> calculated as 0. This causes a WARN_ON() in iomap_iter():<br /> <br /> [17309.548939] WARNING: CPU: 3 PID: 2137 at fs/iomap/iter.c:34 iomap_iter+0x9cf/0xe80<br /> [...]<br /> [17309.650907] RIP: 0010:iomap_iter+0x9cf/0xe80<br /> [...]<br /> [17309.754560] Call Trace:<br /> [17309.757078] <br /> [17309.759240] ? lock_is_held_type+0xd8/0x130<br /> [17309.763531] iomap_readahead+0x1a8/0x870<br /> [17309.767550] ? iomap_read_folio+0x4c0/0x4c0<br /> [17309.771817] ? lockdep_hardirqs_on_prepare+0x400/0x400<br /> [17309.778848] ? lock_release+0x370/0x750<br /> [17309.784462] ? folio_add_lru+0x217/0x3f0<br /> [17309.790220] ? reacquire_held_locks+0x4e0/0x4e0<br /> [17309.796543] read_pages+0x17d/0xb60<br /> [17309.801854] ? folio_add_lru+0x238/0x3f0<br /> [17309.807573] ? readahead_expand+0x5f0/0x5f0<br /> [17309.813554] ? policy_node+0xb5/0x140<br /> [17309.819018] page_cache_ra_unbounded+0x27d/0x450<br /> [17309.825439] filemap_get_pages+0x500/0x1450<br /> [17309.831444] ? filemap_add_folio+0x140/0x140<br /> [17309.837519] ? lock_is_held_type+0xd8/0x130<br /> [17309.843509] filemap_read+0x28c/0x9f0<br /> [17309.848953] ? zonefs_file_read_iter+0x1ea/0x4d0 [zonefs]<br /> [17309.856162] ? trace_contention_end+0xd6/0x130<br /> [17309.862416] ? __mutex_lock+0x221/0x1480<br /> [17309.868151] ? zonefs_file_read_iter+0x166/0x4d0 [zonefs]<br /> [17309.875364] ? filemap_get_pages+0x1450/0x1450<br /> [17309.881647] ? __mutex_unlock_slowpath+0x15e/0x620<br /> [17309.888248] ? wait_for_completion_io_timeout+0x20/0x20<br /> [17309.895231] ? lock_is_held_type+0xd8/0x130<br /> [17309.901115] ? lock_is_held_type+0xd8/0x130<br /> [17309.906934] zonefs_file_read_iter+0x356/0x4d0 [zonefs]<br /> [17309.913750] new_sync_read+0x2d8/0x520<br /> [17309.919035] ? __x64_sys_lseek+0x1d0/0x1d0<br /> <br /> Furthermore, this causes iomap_readahead() to loop forever as<br /> iomap_readahead_iter() always returns 0, making no progress.<br /> <br /> Fix this by treating reads after the file size as access to holes,<br /> setting the iomap type to IOMAP_HOLE, the iomap addr to IOMAP_NULL_ADDR<br /> and using the length argument as is for the iomap length. To simplify<br /> the code with this change, zonefs_iomap_begin() is split into the read<br /> variant, zonefs_read_iomap_begin() and zonefs_read_iomap_ops, and the<br /> write variant, zonefs_write_iomap_begin() and zonefs_write_iomap_ops.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.6 (including) 5.10.125 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.50 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.18.7 (excluding)
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*