CVE-2022-50313

Source
https://cve.org/CVERecord?id=CVE-2022-50313
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50313.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50313
Downstream
Published
2025-09-15T14:46:08.357Z
Modified
2026-03-20T11:47:23.397943Z
Summary
erofs: fix order >= MAX_ORDER warning due to crafted negative i_size
Details

In the Linux kernel, the following vulnerability has been resolved:

erofs: fix order >= MAXORDER warning due to crafted negative isize

As syzbot reported [1], the root cause is that isize field is a signed type, and negative isize is also less than EROFS_BLKSIZ. As a consequence, it's handled as fast symlink unexpectedly.

Let's fall back to the generic path to deal with such unusual i_size.

[1] https://lore.kernel.org/r/000000000000ac8efa05e7feaa1f@google.com

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50313.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
431339ba90423a038914c6032bfd71f0ba7ef2f2
Fixed
17a0cdbd7b0cf0fc0d7ca4187a67f8f1c18c291f
Fixed
0ab621fcdff1a58ff4de51a8590fa92a0ecd34be
Fixed
acc2f40b980c61a9178b72cdedd150b829064997
Fixed
b6c8330f5b0f22149957a2e4977fd0f01a9db7cd
Fixed
6235fb899b25fd287d5e42635ff82196395708cc
Fixed
1dd73601a1cba37a0ed5f89a8662c90191df5873

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50313.json"