CVE-2022-49348

Source
https://cve.org/CVERecord?id=CVE-2022-49348
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49348.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49348
Downstream
Related
Published
2025-02-26T02:11:02.518Z
Modified
2026-03-20T12:22:22.218626Z
Summary
ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: filter out EXT4FCREPLAY from on-disk superblock field s_state

The EXT4FCREPLAY bit in sbi->smountstate is used to indicate that we are in the middle of replay the fast commit journal. This was actually a mistake, since the sbi->smountinfo is initialized from es->sstate. Arguably smountstate is misleadingly named, but the name is historical --- smountstate and sstate dates back to ext2.

What should have been used is the ext4_{set,clear,test}mountflag() inline functions, which sets EXT4MF* bits in sbi->smountflags.

The problem with using EXT4FCREPLAY is that a maliciously corrupted superblock could result in EXT4FCREPLAY getting set in smountstate. This bypasses some sanity checks, and this can trigger a BUG() in ext4escacheextent(). As a easy-to-backport-fix, filter out the EXT4FCREPLAY bit for now. We should eventually transition away from EXT4FCREPLAY to something like EXT4MF_REPLAY.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49348.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8016e29f4362e285f0f7e38fadc61a5b7bdfdfa2
Fixed
cc5b09cb6dacd4b32640537929ab4ee8fb2b9e04
Fixed
b99fd73418350dea360da8311e87a6a7b0e15a4c
Fixed
af2f1932743fb52ebcb008ad7ac500d9df0aa796
Fixed
55b4dbb29054a05d839562f6d635ce05669b016d
Fixed
c878bea3c9d724ddfa05a813f30de3d25a0ba83f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49348.json"