CVE-2022-50313
15.09.2025, 15:15
In the Linux kernel, the following vulnerability has been resolved: erofs: fix order >= MAX_ORDER warning due to crafted negative i_size As syzbot reported [1], the root cause is that i_size field is a signed type, and negative i_size is also less than EROFS_BLKSIZ. As a consequence, it's handled as fast symlink unexpectedly. Let's fall back to the generic path to deal with such unusual i_size. [1] https://lore.kernel.org/r/000000000000ac8efa05e7feaa1f@google.comEnginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.19 ≤ 𝑥 < 5.4.289 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.233 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.82 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 5.19.17 |
| linux | linux_kernel | 6.0 ≤ 𝑥 < 6.0.3 |
𝑥
= Vulnerable software versions
Debian Releases
References