CVE-2022-50013
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
14/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: fix to avoid use f2fs_bug_on() in f2fs_new_node_page()<br />
<br />
As Dipanjan Das reported, syzkaller<br />
found a f2fs bug as below:<br />
<br />
RIP: 0010:f2fs_new_node_page+0x19ac/0x1fc0 fs/f2fs/node.c:1295<br />
Call Trace:<br />
write_all_xattrs fs/f2fs/xattr.c:487 [inline]<br />
__f2fs_setxattr+0xe76/0x2e10 fs/f2fs/xattr.c:743<br />
f2fs_setxattr+0x233/0xab0 fs/f2fs/xattr.c:790<br />
f2fs_xattr_generic_set+0x133/0x170 fs/f2fs/xattr.c:86<br />
__vfs_setxattr+0x115/0x180 fs/xattr.c:182<br />
__vfs_setxattr_noperm+0x125/0x5f0 fs/xattr.c:216<br />
__vfs_setxattr_locked+0x1cf/0x260 fs/xattr.c:277<br />
vfs_setxattr+0x13f/0x330 fs/xattr.c:303<br />
setxattr+0x146/0x160 fs/xattr.c:611<br />
path_setxattr+0x1a7/0x1d0 fs/xattr.c:630<br />
__do_sys_lsetxattr fs/xattr.c:653 [inline]<br />
__se_sys_lsetxattr fs/xattr.c:649 [inline]<br />
__x64_sys_lsetxattr+0xbd/0x150 fs/xattr.c:649<br />
do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br />
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80<br />
entry_SYSCALL_64_after_hwframe+0x46/0xb0<br />
<br />
NAT entry and nat bitmap can be inconsistent, e.g. one nid is free<br />
in nat bitmap, and blkaddr in its NAT entry is not NULL_ADDR, it<br />
may trigger BUG_ON() in f2fs_new_node_page(), fix it.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.8 (including) | 4.19.256 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.211 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.138 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.63 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.19.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/141170b759e03958f296033bb7001be62d1d363b
- https://git.kernel.org/stable/c/29e734ec33ae4bd7de4018fb0fb0eec808c36b92
- https://git.kernel.org/stable/c/43ce0a0bda2c54dad91d5a1943554eed9e050f55
- https://git.kernel.org/stable/c/5a01e45b925a0bc9718eccd33e5920f1a4e44caf
- https://git.kernel.org/stable/c/800ba8979111184d5194f4233cc83afe683efc54
- https://git.kernel.org/stable/c/fbfad62b29e9f8f1c1026a806c9e064ec2a7c342



