CVE-2022-49318
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved: f2fs: remove WARN_ON in f2fs_is_valid_blkaddr Syzbot triggers two WARNs in f2fs_is_valid_blkaddr and __is_bitmap_valid. For example, in f2fs_is_valid_blkaddr, if type is DATA_GENERIC_ENHANCE or DATA_GENERIC_ENHANCE_READ, it invokes WARN_ON if blkaddr is not in the right range. The call trace is as follows: f2fs_get_node_info+0x45f/0x1070 read_node_page+0x577/0x1190 __get_node_page.part.0+0x9e/0x10e0 __get_node_page f2fs_get_node_page+0x109/0x180 do_read_inode f2fs_iget+0x2a5/0x58b0 f2fs_fill_super+0x3b39/0x7ca0 Fix these two WARNs by replacing WARN_ON with dump_stack.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 𝑥 < 5.4.198 |
linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.122 |
linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.47 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 5.17.15 |
linux | linux_kernel | 5.18 ≤ 𝑥 < 5.18.4 |
𝑥
= Vulnerable software versions

Debian Releases
References