vulnerability
Ubuntu: (CVE-2022-49318): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Feb 26, 2025 | Mar 3, 2025 | Sep 1, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
f2fs: remove WARN_ON in f2fs_is_valid_blkaddr
Syzbot triggers two WARNs in f2fs_is_valid_blkaddr and
__is_bitmap_valid. For example, in f2fs_is_valid_blkaddr,
if type is DATA_GENERIC_ENHANCE or DATA_GENERIC_ENHANCE_READ,
it invokes WARN_ON if blkaddr is not in the right range.
The call trace is as follows:
f2fs_get_node_info+0x45f/0x1070
read_node_page+0x577/0x1190
__get_node_page.part.0+0x9e/0x10e0
__get_node_page
f2fs_get_node_page+0x109/0x180
do_read_inode
f2fs_iget+0x2a5/0x58b0
f2fs_fill_super+0x3b39/0x7ca0
Fix these two WARNs by replacing WARN_ON with dump_stack.
Solutions
References
- CVE-2022-49318
- https://attackerkb.com/topics/CVE-2022-49318
- URL-https://git.kernel.org/linus/dc2f78e2d4cc844a1458653d57ce1b54d4a29f21
- URL-https://git.kernel.org/stable/c/0a7a1fc7e71eecf2e5053a6c312c9f0dcbb9b8fd
- URL-https://git.kernel.org/stable/c/32bea51fe4c6e92c00403739f7547c89219bea88
- URL-https://git.kernel.org/stable/c/8c62c5e26345c34d199b4b8c8e69255ba3d0e751
- URL-https://git.kernel.org/stable/c/99c09b298e47ebbe345a6da9f268b32a6b0f4582
- URL-https://git.kernel.org/stable/c/cd6374af36cc548464d8c47a93fdba7303bb82a4
- URL-https://git.kernel.org/stable/c/dc2f78e2d4cc844a1458653d57ce1b54d4a29f21
- URL-https://www.cve.org/CVERecord?id=CVE-2022-49318
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.