CVE-2022-48877

Source
https://cve.org/CVERecord?id=CVE-2022-48877
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48877.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48877
Downstream
Published
2024-08-21T06:10:08.371Z
Modified
2026-04-11T12:43:11.105181Z
Summary
f2fs: let's avoid panic if extent_tree is not created
Details

In the Linux kernel, the following vulnerability has been resolved:

f2fs: let's avoid panic if extent_tree is not created

This patch avoids the below panic.

pc : __lookupextenttree+0xd8/0x760 lr : f2fsdowritedatapage+0x104/0x87c sp : ffffffc010cbb3c0 x29: ffffffc010cbb3e0 x28: 0000000000000000 x27: ffffff8803e7f020 x26: ffffff8803e7ed40 x25: ffffff8803e7f020 x24: ffffffc010cbb460 x23: ffffffc010cbb480 x22: 0000000000000000 x21: 0000000000000000 x20: ffffffff22e90900 x19: 0000000000000000 x18: ffffffc010c5d080 x17: 0000000000000000 x16: 0000000000000020 x15: ffffffdb1acdbb88 x14: ffffff888759e2b0 x13: 0000000000000000 x12: ffffff802da49000 x11: 000000000a001200 x10: ffffff8803e7ed40 x9 : ffffff8023195800 x8 : ffffff802da49078 x7 : 0000000000000001 x6 : 0000000000000000 x5 : 0000000000000006 x4 : ffffffc010cbba28 x3 : 0000000000000000 x2 : ffffffc010cbb480 x1 : 0000000000000000 x0 : ffffff8803e7ed40 Call trace: __lookupextenttree+0xd8/0x760 f2fsdowritedatapage+0x104/0x87c f2fswritesingledatapage+0x420/0xb60 f2fswritecache_pages+0x418/0xb1c __f2fswritedatapages+0x428/0x58c f2fswritedatapages+0x30/0x40 do_writepages+0x88/0x190 __writebacksingleinode+0x48/0x448 writebacksbinodes+0x468/0x9e8 _writebackinodeswb+0xb8/0x2a4 wbwriteback+0x33c/0x740 wbdowriteback+0x2b4/0x400 wbworkfn+0xe4/0x34c processonework+0x24c/0x5bc workerthread+0x3e8/0xa50 kthread+0x150/0x1b4

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48877.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
98e4da8ca301e062d79ae168c67e56f3c3de3ce4
Fixed
dd83a9763e29ed7a21c8a43f7a62cd0a6bf74692
Fixed
ff85a1dbd90d29f73033177ff8d8de4a27d9721c
Fixed
557e85ff9afef6d45020b6f09357111d38033c31
Fixed
72009139a661ade5cb1da4239734ed02fa1cfff0
Fixed
2c129e868992621a739bdd57a5bffa3985ef1b91
Fixed
1c38cdc747f00daf7394535eae5afc4c503c59bb
Fixed
df9d44b645b83fffccfb4e28c1f93376585fdec8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48877.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.8.0
Fixed
4.14.304
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.271
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.230
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.165
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.90
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48877.json"