Skip to main content

CVE-2022-49428: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49428cvecve-2022-49428
Published: Wed Feb 26 2025 (02/26/2025, 02:12:48 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to do sanity check on inline_dots inode As Wenqing reported in bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=215765 It will cause a kernel panic with steps: - mkdir mnt - mount tmp40.img mnt - ls mnt folio_mark_dirty+0x33/0x50 f2fs_add_regular_entry+0x541/0xad0 [f2fs] f2fs_add_dentry+0x6c/0xb0 [f2fs] f2fs_do_add_link+0x182/0x230 [f2fs] __recover_dot_dentries+0x2d6/0x470 [f2fs] f2fs_lookup+0x5af/0x6a0 [f2fs] __lookup_slow+0xac/0x200 lookup_slow+0x45/0x70 walk_component+0x16c/0x250 path_lookupat+0x8b/0x1f0 filename_lookup+0xef/0x250 user_path_at_empty+0x46/0x70 vfs_statx+0x98/0x190 __do_sys_newlstat+0x41/0x90 __x64_sys_newlstat+0x1a/0x30 do_syscall_64+0x37/0xb0 entry_SYSCALL_64_after_hwframe+0x44/0xae The root cause is for special file: e.g. character, block, fifo or socket file, f2fs doesn't assign address space operations pointer array for mapping->a_ops field, so, in a fuzzed image, if inline_dots flag was tagged in special file, during lookup(), when f2fs runs into __recover_dot_dentries(), it will cause NULL pointer access once f2fs_add_regular_entry() calls a_ops->set_dirty_page().

AI-Powered Analysis

AILast updated: 06/30/2025, 07:09:52 UTC

Technical Analysis

CVE-2022-49428 is a vulnerability in the Linux kernel's F2FS (Flash-Friendly File System) implementation. The flaw arises from improper handling of special files (character, block, fifo, or socket files) within the F2FS filesystem. Specifically, the vulnerability is due to the failure to assign the address space operations pointer array for the mapping->a_ops field for these special files. When a specially crafted (fuzzed) image containing the inline_dots flag set on a special file is mounted, the kernel's lookup process triggers a NULL pointer dereference during the __recover_dot_dentries() function call. This occurs because f2fs_add_regular_entry() attempts to invoke a_ops->set_dirty_page(), but since a_ops is NULL, it results in a kernel panic. The vulnerability can be triggered by mounting a maliciously crafted image and performing a directory listing (ls) on the mount point, causing a denial of service (DoS) via kernel panic. The root cause is a missing sanity check on the inline_dots inode in the F2FS code path. This vulnerability affects Linux kernel versions containing the specified commit hash (510022a85839a8409d1e6a519bb86ce71a84f30a) and was publicly disclosed on 2025-02-26. No known exploits are reported in the wild as of now, and no CVSS score has been assigned. The vulnerability is significant because it can cause system crashes, impacting availability and potentially leading to service disruption on affected Linux systems using F2FS.

Potential Impact

For European organizations, the impact of CVE-2022-49428 primarily involves availability disruption due to kernel panics triggered by mounting specially crafted F2FS images. Organizations relying on Linux systems with F2FS, especially those using flash storage devices or embedded systems where F2FS is common, may experience unexpected system crashes leading to downtime. This can affect cloud service providers, data centers, telecom infrastructure, and embedded device manufacturers prevalent in Europe. While the vulnerability does not directly expose confidentiality or integrity risks, the denial of service could interrupt critical services, leading to operational and financial impacts. Additionally, if exploited in multi-tenant environments, it could be used to disrupt other tenants' workloads. Since exploitation requires mounting a malicious image and triggering a directory listing, attackers would need some level of access to the system or the ability to persuade users to mount malicious media, which may limit remote exploitation but does not eliminate insider or supply chain risks. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent future exploitation.

Mitigation Recommendations

1. Apply the official Linux kernel patches that fix the inline_dots inode sanity check in F2FS as soon as they become available from trusted Linux distributions or kernel maintainers. 2. Restrict mounting of untrusted or unknown F2FS images, especially from external or removable media, to reduce exposure to crafted malicious images. 3. Implement strict access controls and monitoring on systems that allow mounting of filesystems, ensuring only authorized users can perform such operations. 4. Use filesystem integrity monitoring tools to detect unusual or unauthorized mounting activities. 5. For embedded or specialized devices using F2FS, coordinate with vendors to obtain updated firmware or kernel versions addressing this vulnerability. 6. Employ kernel crash monitoring and automated recovery mechanisms to minimize downtime in case of unexpected panics. 7. Educate system administrators about the risks of mounting untrusted images and encourage best practices for filesystem management. 8. Consider disabling F2FS support if it is not required in the environment to eliminate the attack surface related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.569Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe59c3

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 7:09:52 AM

Last updated: 7/28/2025, 9:57:33 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats