CVE-2022-49707

Source
https://cve.org/CVERecord?id=CVE-2022-49707
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49707.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49707
Downstream
Related
Published
2025-02-26T02:24:25.441Z
Modified
2026-03-20T11:47:07.775973Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ext4: add reserved GDT blocks check
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: add reserved GDT blocks check

We capture a NULL pointer issue when resizing a corrupt ext4 image which is freshly clear resizeinode feature (not run e2fsck). It could be simply reproduced by following steps. The problem is because of the resizeinode feature was cleared, and it will convert the filesystem to metabg mode in ext4resizefs(), but the es->sreservedgdtblocks was not reduced to zero, so could we mistakenly call reservebackupgdb() and passing an uninitialized resize_inode to it when adding new group descriptors.

mkfs.ext4 /dev/sda 3G tune2fs -O ^resize_inode /dev/sda #forget to run requested e2fsck mount /dev/sda /mnt resize2fs /dev/sda 8G

======== BUG: kernel NULL pointer dereference, address: 0000000000000028 CPU: 19 PID: 3243 Comm: resize2fs Not tainted 5.18.0-rc7-00001-gfde086c5ebfd #748 ... RIP: 0010:ext4flexgroupadd+0xe08/0x2570 ... Call Trace: <TASK> ext4resize_fs+0xbec/0x1660 __ext4ioctl+0x1749/0x24e0 ext4ioctl+0x12/0x20 __x64sysioctl+0xa6/0x110 dosyscall64+0x3b/0x90 entrySYSCALL64afterhwframe+0x44/0xae RIP: 0033:0x7f2dd739617b ========

The fix is simple, add a check in ext4resizebegin() to make sure that the es->sreservedgdtblocks is zero when the resizeinode feature is disabled.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49707.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1c6bd7173d66b3dfdefcedb38cabc1fb03997509
Fixed
0dc2fca8e4f9ac4a40e8424a10163369cca0cc06
Fixed
7c921328ac760bba780bdace41f4cd045f7f1405
Fixed
b9747263b13e5290ac4d63bec47e38f701303cad
Fixed
fba54289176702a7caac0b64738406775817f451
Fixed
bfd004a1d3a062aac300523d406ac1f3e5f1a82c
Fixed
33b1bba31f4c784d33d2c2517964bdccdc9204cd
Fixed
af75c481a2e45e70f62f5942c93695e95bf7bd21
Fixed
b55c3cd102a6f48b90e61c44f7f3dda8c290c694

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49707.json"