CVE-2022-49255

Source
https://cve.org/CVERecord?id=CVE-2022-49255
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49255.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49255
Downstream
Published
2025-02-26T01:56:10.085Z
Modified
2026-04-11T12:43:45.513745Z
Summary
f2fs: fix missing free nid in f2fs_handle_failed_inode
Details

In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix missing free nid in f2fshandlefailed_inode

This patch fixes xfstests/generic/475 failure.

[ 293.680694] F2FS-fs (dm-1): May loss orphan inode, run fsck to fix. [ 293.685358] Buffer I/O error on dev dm-1, logical block 8388592, async page read [ 293.691527] Buffer I/O error on dev dm-1, logical block 8388592, async page read [ 293.691764] sh (7615): dropcaches: 3 [ 293.691819] sh (7616): dropcaches: 3 [ 293.694017] Buffer I/O error on dev dm-1, logical block 1, async page read [ 293.695659] sh (7618): dropcaches: 3 [ 293.696979] sh (7617): dropcaches: 3 [ 293.700290] sh (7623): dropcaches: 3 [ 293.708621] sh (7626): dropcaches: 3 [ 293.711386] sh (7628): dropcaches: 3 [ 293.711825] sh (7627): dropcaches: 3 [ 293.716738] sh (7630): dropcaches: 3 [ 293.719613] sh (7632): dropcaches: 3 [ 293.720971] sh (7633): dropcaches: 3 [ 293.727741] sh (7634): dropcaches: 3 [ 293.730783] sh (7636): dropcaches: 3 [ 293.732681] sh (7635): dropcaches: 3 [ 293.732988] sh (7637): dropcaches: 3 [ 293.738836] sh (7639): dropcaches: 3 [ 293.740568] sh (7641): dropcaches: 3 [ 293.743053] sh (7640): dropcaches: 3 [ 293.821889] ------------[ cut here ]------------ [ 293.824654] kernel BUG at fs/f2fs/node.c:3334! [ 293.826226] invalid opcode: 0000 [#1] PREEMPT SMP PTI [ 293.828713] CPU: 0 PID: 7653 Comm: umount Tainted: G OE 5.17.0-rc1-custom #1 [ 293.830946] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 [ 293.832526] RIP: 0010:f2fsdestroynodemanager+0x33f/0x350 [f2fs] [ 293.833905] Code: e8 d6 3d f9 f9 48 8b 45 d0 65 48 2b 04 25 28 00 00 00 75 1a 48 81 c4 28 03 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 0b [ 293.837783] RSP: 0018:ffffb04ec31e7a20 EFLAGS: 00010202 [ 293.839062] RAX: 0000000000000001 RBX: ffff9df947db2eb8 RCX: 0000000080aa0072 [ 293.840666] RDX: 0000000000000000 RSI: ffffe86c0432a140 RDI: ffffffffc0b72a21 [ 293.842261] RBP: ffffb04ec31e7d70 R08: ffff9df94ca85780 R09: 0000000080aa0072 [ 293.843909] R10: ffff9df94ca85700 R11: ffff9df94e1ccf58 R12: ffff9df947db2e00 [ 293.845594] R13: ffff9df947db2ed0 R14: ffff9df947db2eb8 R15: ffff9df947db2eb8 [ 293.847855] FS: 00007f5a97379800(0000) GS:ffff9dfa77c00000(0000) knlGS:0000000000000000 [ 293.850647] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 293.852940] CR2: 00007f5a97528730 CR3: 000000010bc76005 CR4: 0000000000370ef0 [ 293.854680] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 293.856423] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 293.858380] Call Trace: [ 293.859302] <TASK> [ 293.860311] ? ttwudowakeup+0x1c/0x170 [ 293.861800] ? ttwudoactivate+0x6d/0xb0 [ 293.863057] ? rawspinunlockirqrestore+0x29/0x40 [ 293.864411] ? trytowakeup+0x9d/0x5e0 [ 293.865618] ? debugsmpprocessorid+0x17/0x20 [ 293.866934] ? debugsmpprocessorid+0x17/0x20 [ 293.868223] ? freeunrefpage+0xbf/0x120 [ 293.869470] ? __freeslab+0xcb/0x1c0 [ 293.870614] ? preemptcount_add+0x7a/0xc0 [ 293.871811] ? __slab_free+0xa0/0x2d0 [ 293.872918] ? __wakeupcommon_lock+0x8a/0xc0 [ 293.874186] ? __slabfree+0xa0/0x2d0 [ 293.875305] ? freeinodenonrcu+0x20/0x20 [ 293.876466] ? freeinode_nonrcu+0x20/0x20 [ 293.877650] ? debugsmpprocessorid+0x17/0x20 [ 293.878949] ? callrcu+0x11a/0x240 [ 293.880060] ? f2fsdestroystats+0x59/0x60 [f2fs] [ 293.881437] ? kfree+0x1fe/0x230 [ 293.882674] f2fsputsuper+0x160/0x390 [f2fs] [ 293.883978] genericshutdownsuper+0x7a/0x120 [ 293.885274] killblocksuper+0x27/0x50 [ 293.886496] killf2fssuper+0x7f/0x100 [f2fs] [ 293.887806] deactivatelockedsuper+0x35/0xa0 [ 293.889271] deactivatesuper+0x40/0x50 [ 293.890513] cleanupmnt+0x139/0x190 [ 293.891689] _cleanupmnt+0x12/0x20 [ 293.892850] taskworkrun+0x64/0xa0 [ 293.894035] exittousermodeprepare+0x1b7/ ---truncated---

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49255.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7735730d39d75e70476c1b01435b9b1f41637f0e
Fixed
005f9cdab70c915702254c5eb67a8efced80e821
Fixed
1a11a873749c6375bb668953fa1a196d8538d26b
Fixed
d1eaaf6cadedf638e17017b0a04d56308405ac10
Fixed
aa80bf73e3b3fb7026d343c77b3ddc849e26a095
Fixed
8579b413af100ec5f3592bd6cf11559312b380c0
Fixed
2fef99b8372c1ae3d8445ab570e888b5a358dbe9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49255.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.19.0
Fixed
5.4.189
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.110
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.33
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.19
Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
5.17.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49255.json"