CVE-2022-49318

In the Linux kernel, the following vulnerability has been resolved: f2fs: remove WARN_ON in f2fs_is_valid_blkaddr Syzbot triggers two WARNs in f2fs_is_valid_blkaddr and __is_bitmap_valid. For example, in f2fs_is_valid_blkaddr, if type is DATA_GENERIC_ENHANCE or DATA_GENERIC_ENHANCE_READ, it invokes WARN_ON if blkaddr is not in the right range. The call trace is as follows: f2fs_get_node_info+0x45f/0x1070 read_node_page+0x577/0x1190 __get_node_page.part.0+0x9e/0x10e0 __get_node_page f2fs_get_node_page+0x109/0x180 do_read_inode f2fs_iget+0x2a5/0x58b0 f2fs_fill_super+0x3b39/0x7ca0 Fix these two WARNs by replacing WARN_ON with dump_stack.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Apr 2025, 19:59

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: eliminar WARN_ON en f2fs_is_valid_blkaddr Syzbot activa dos WARN en f2fs_is_valid_blkaddr y __is_bitmap_valid. Por ejemplo, en f2fs_is_valid_blkaddr, si el tipo es DATA_GENERIC_ENHANCE o DATA_GENERIC_ENHANCE_READ, invoca WARN_ON si blkaddr no está en el rango correcto. El seguimiento de la llamada es el siguiente: f2fs_get_node_info+0x45f/0x1070 read_node_page+0x577/0x1190 __get_node_page.part.0+0x9e/0x10e0 __get_node_page f2fs_get_node_page+0x109/0x180 do_read_inode f2fs_iget+0x2a5/0x58b0 f2fs_fill_super+0x3b39/0x7ca0 Corrija estas dos ADVERTENCIAS reemplazando WARN_ON con dump_stack.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/0a7a1fc7e71eecf2e5053a6c312c9f0dcbb9b8fd - () https://git.kernel.org/stable/c/0a7a1fc7e71eecf2e5053a6c312c9f0dcbb9b8fd - Patch
References () https://git.kernel.org/stable/c/32bea51fe4c6e92c00403739f7547c89219bea88 - () https://git.kernel.org/stable/c/32bea51fe4c6e92c00403739f7547c89219bea88 - Patch
References () https://git.kernel.org/stable/c/8c62c5e26345c34d199b4b8c8e69255ba3d0e751 - () https://git.kernel.org/stable/c/8c62c5e26345c34d199b4b8c8e69255ba3d0e751 - Patch
References () https://git.kernel.org/stable/c/99c09b298e47ebbe345a6da9f268b32a6b0f4582 - () https://git.kernel.org/stable/c/99c09b298e47ebbe345a6da9f268b32a6b0f4582 - Patch
References () https://git.kernel.org/stable/c/cd6374af36cc548464d8c47a93fdba7303bb82a4 - () https://git.kernel.org/stable/c/cd6374af36cc548464d8c47a93fdba7303bb82a4 - Patch
References () https://git.kernel.org/stable/c/dc2f78e2d4cc844a1458653d57ce1b54d4a29f21 - () https://git.kernel.org/stable/c/dc2f78e2d4cc844a1458653d57ce1b54d4a29f21 - Patch
CWE NVD-CWE-noinfo
First Time Linux linux Kernel
Linux

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-04-14 19:59


NVD link : CVE-2022-49318

Mitre link : CVE-2022-49318

CVE.ORG link : CVE-2022-49318


JSON object : View

Products Affected

linux

  • linux_kernel