CVE-2022-49428

Source
https://cve.org/CVERecord?id=CVE-2022-49428
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49428.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49428
Downstream
Published
2025-02-26T02:12:48.149Z
Modified
2026-03-12T03:25:10.221497Z
Summary
f2fs: fix to do sanity check on inline_dots inode
Details

In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to do sanity check on inline_dots inode

As Wenqing reported in bugzilla:

https://bugzilla.kernel.org/show_bug.cgi?id=215765

It will cause a kernel panic with steps: - mkdir mnt - mount tmp40.img mnt - ls mnt

foliomarkdirty+0x33/0x50 f2fsaddregularentry+0x541/0xad0 [f2fs] f2fsadddentry+0x6c/0xb0 [f2fs] f2fsdoaddlink+0x182/0x230 [f2fs] __recoverdotdentries+0x2d6/0x470 [f2fs] f2fs_lookup+0x5af/0x6a0 [f2fs] __lookupslow+0xac/0x200 lookupslow+0x45/0x70 walk_component+0x16c/0x250 pathlookupat+0x8b/0x1f0 filenamelookup+0xef/0x250 userpathatempty+0x46/0x70 vfsstatx+0x98/0x190 __dosysnewlstat+0x41/0x90 __x64sysnewlstat+0x1a/0x30 dosyscall64+0x37/0xb0 entrySYSCALL64afterhwframe+0x44/0xae

The root cause is for special file: e.g. character, block, fifo or socket file, f2fs doesn't assign address space operations pointer array for mapping->aops field, so, in a fuzzed image, if inlinedots flag was tagged in special file, during lookup(), when f2fs runs into __recoverdotdentries(), it will cause NULL pointer access once f2fsaddregularentry() calls aops->setdirtypage().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49428.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
510022a85839a8409d1e6a519bb86ce71a84f30a
Fixed
250e5a6be52a6b9d82fe91976c83cc158868b4e9
Fixed
34f48ce5d5936eea33e3b6415403e57eb84aff97
Fixed
2f46160d0a19b13bfe96c0dd50eed5c5d253ab7a
Fixed
12662d19467b391b5b509ac5e9ab4f583c6dde16

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49428.json"