CVE-2022-49707

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49707
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49707.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49707
Downstream
Related
Published
2025-02-26T02:24:25.441Z
Modified
2025-11-28T02:35:47.330093Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ext4: add reserved GDT blocks check
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: add reserved GDT blocks check

We capture a NULL pointer issue when resizing a corrupt ext4 image which is freshly clear resizeinode feature (not run e2fsck). It could be simply reproduced by following steps. The problem is because of the resizeinode feature was cleared, and it will convert the filesystem to metabg mode in ext4resizefs(), but the es->sreservedgdtblocks was not reduced to zero, so could we mistakenly call reservebackupgdb() and passing an uninitialized resize_inode to it when adding new group descriptors.

mkfs.ext4 /dev/sda 3G tune2fs -O ^resize_inode /dev/sda #forget to run requested e2fsck mount /dev/sda /mnt resize2fs /dev/sda 8G

======== BUG: kernel NULL pointer dereference, address: 0000000000000028 CPU: 19 PID: 3243 Comm: resize2fs Not tainted 5.18.0-rc7-00001-gfde086c5ebfd #748 ... RIP: 0010:ext4flexgroupadd+0xe08/0x2570 ... Call Trace: <TASK> ext4resizefs+0xbec/0x1660 _ext4ioctl+0x1749/0x24e0 ext4ioctl+0x12/0x20 _x64sysioctl+0xa6/0x110 dosyscall64+0x3b/0x90 entrySYSCALL64after_hwframe+0x44/0xae RIP: 0033:0x7f2dd739617b ========

The fix is simple, add a check in ext4resizebegin() to make sure that the es->sreservedgdtblocks is zero when the resizeinode feature is disabled.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49707.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
0dc2fca8e4f9ac4a40e8424a10163369cca0cc06
Fixed
7c921328ac760bba780bdace41f4cd045f7f1405
Fixed
b9747263b13e5290ac4d63bec47e38f701303cad
Fixed
fba54289176702a7caac0b64738406775817f451
Fixed
bfd004a1d3a062aac300523d406ac1f3e5f1a82c
Fixed
33b1bba31f4c784d33d2c2517964bdccdc9204cd
Fixed
af75c481a2e45e70f62f5942c93695e95bf7bd21
Fixed
b55c3cd102a6f48b90e61c44f7f3dda8c290c694

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.9.320
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.285
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.249
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.200
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.124
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.49
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.6