CVE-2022-49747: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: erofs/zmap.c: Fix incorrect offset calculation Effective offset to add to length was being incorrectly calculated, which resulted in iomap->length being set to 0, triggering a WARN_ON in iomap_iter_done(). Fix that, and describe it in comments. This was reported as a crash by syzbot under an issue about a warning encountered in iomap_iter_done(), but unrelated to erofs. C reproducer: https://syzkaller.appspot.com/text?tag=ReproC&x=1037a6b2880000 Kernel config: https://syzkaller.appspot.com/text?tag=KernelConfig&x=e2021a61197ebe02 Dashboard link: https://syzkaller.appspot.com/bug?extid=a8e049cd3abd342936b6
AI Analysis
Technical Summary
CVE-2022-49747 is a vulnerability identified in the Linux kernel, specifically within the erofs filesystem implementation in the file erofs/zmap.c. The issue stems from an incorrect calculation of the offset used to add to the length parameter during I/O mapping operations. This miscalculation results in the iomap->length being set to zero, which subsequently triggers a WARN_ON condition in the kernel function iomap_iter_done(). The WARN_ON is a kernel debugging mechanism that indicates an unexpected or erroneous state, in this case related to the I/O mapping iteration completion. The vulnerability was discovered through automated fuzz testing by syzbot, a kernel fuzzing tool, which reported a crash linked to this warning. The root cause is a logic error in offset calculation rather than a direct memory corruption or privilege escalation vector. The issue has been fixed by correcting the offset calculation and adding clarifying comments in the source code. The vulnerability does not currently have any known exploits in the wild, and no CVSS score has been assigned. The affected versions are specific commits of the Linux kernel identified by their hashes, indicating that this is a recent and targeted fix. The vulnerability primarily affects systems running Linux kernels that include the erofs filesystem module and that have the affected code version. Since erofs is a relatively new, high-performance read-only filesystem designed for embedded and mobile devices, the impact surface is somewhat specialized but still relevant for Linux environments using this filesystem.
Potential Impact
For European organizations, the impact of CVE-2022-49747 is primarily related to system stability and reliability rather than direct security compromise. The vulnerability causes kernel warnings and potentially crashes in systems using the erofs filesystem, which could lead to denial of service conditions if exploited or triggered unintentionally. Organizations relying on Linux-based embedded systems, mobile devices, or specialized appliances that utilize erofs could experience unexpected system reboots or service interruptions. This could affect sectors such as telecommunications, automotive, industrial control systems, and IoT deployments prevalent in Europe. While there is no evidence of privilege escalation or data breach from this vulnerability, the disruption caused by kernel crashes can impact availability and operational continuity. Given the absence of known exploits and the technical nature of the flaw, the immediate risk to large-scale enterprise IT environments is limited unless erofs is actively used. However, organizations should be aware that unpatched systems may face stability issues, which could indirectly affect business operations and service delivery.
Mitigation Recommendations
To mitigate the risk posed by CVE-2022-49747, European organizations should: 1) Identify Linux systems that utilize the erofs filesystem, particularly embedded or mobile devices, and verify the kernel versions in use against the affected commits. 2) Apply the official Linux kernel patches that correct the offset calculation in erofs/zmap.c as soon as they become available from trusted Linux distribution vendors or kernel maintainers. 3) For systems where immediate patching is not feasible, consider disabling the erofs filesystem module if it is not required, to eliminate the attack surface. 4) Monitor system logs for WARN_ON messages related to iomap_iter_done() as an indicator of potential triggering of this vulnerability. 5) Incorporate kernel fuzzing and testing tools like syzbot into the development and QA processes to detect similar issues proactively. 6) Maintain an inventory of embedded and IoT devices running Linux kernels with erofs support to ensure timely updates. These steps go beyond generic advice by focusing on the specific filesystem and kernel component involved, emphasizing proactive detection and patch management tailored to the affected technology.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2022-49747: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: erofs/zmap.c: Fix incorrect offset calculation Effective offset to add to length was being incorrectly calculated, which resulted in iomap->length being set to 0, triggering a WARN_ON in iomap_iter_done(). Fix that, and describe it in comments. This was reported as a crash by syzbot under an issue about a warning encountered in iomap_iter_done(), but unrelated to erofs. C reproducer: https://syzkaller.appspot.com/text?tag=ReproC&x=1037a6b2880000 Kernel config: https://syzkaller.appspot.com/text?tag=KernelConfig&x=e2021a61197ebe02 Dashboard link: https://syzkaller.appspot.com/bug?extid=a8e049cd3abd342936b6
AI-Powered Analysis
Technical Analysis
CVE-2022-49747 is a vulnerability identified in the Linux kernel, specifically within the erofs filesystem implementation in the file erofs/zmap.c. The issue stems from an incorrect calculation of the offset used to add to the length parameter during I/O mapping operations. This miscalculation results in the iomap->length being set to zero, which subsequently triggers a WARN_ON condition in the kernel function iomap_iter_done(). The WARN_ON is a kernel debugging mechanism that indicates an unexpected or erroneous state, in this case related to the I/O mapping iteration completion. The vulnerability was discovered through automated fuzz testing by syzbot, a kernel fuzzing tool, which reported a crash linked to this warning. The root cause is a logic error in offset calculation rather than a direct memory corruption or privilege escalation vector. The issue has been fixed by correcting the offset calculation and adding clarifying comments in the source code. The vulnerability does not currently have any known exploits in the wild, and no CVSS score has been assigned. The affected versions are specific commits of the Linux kernel identified by their hashes, indicating that this is a recent and targeted fix. The vulnerability primarily affects systems running Linux kernels that include the erofs filesystem module and that have the affected code version. Since erofs is a relatively new, high-performance read-only filesystem designed for embedded and mobile devices, the impact surface is somewhat specialized but still relevant for Linux environments using this filesystem.
Potential Impact
For European organizations, the impact of CVE-2022-49747 is primarily related to system stability and reliability rather than direct security compromise. The vulnerability causes kernel warnings and potentially crashes in systems using the erofs filesystem, which could lead to denial of service conditions if exploited or triggered unintentionally. Organizations relying on Linux-based embedded systems, mobile devices, or specialized appliances that utilize erofs could experience unexpected system reboots or service interruptions. This could affect sectors such as telecommunications, automotive, industrial control systems, and IoT deployments prevalent in Europe. While there is no evidence of privilege escalation or data breach from this vulnerability, the disruption caused by kernel crashes can impact availability and operational continuity. Given the absence of known exploits and the technical nature of the flaw, the immediate risk to large-scale enterprise IT environments is limited unless erofs is actively used. However, organizations should be aware that unpatched systems may face stability issues, which could indirectly affect business operations and service delivery.
Mitigation Recommendations
To mitigate the risk posed by CVE-2022-49747, European organizations should: 1) Identify Linux systems that utilize the erofs filesystem, particularly embedded or mobile devices, and verify the kernel versions in use against the affected commits. 2) Apply the official Linux kernel patches that correct the offset calculation in erofs/zmap.c as soon as they become available from trusted Linux distribution vendors or kernel maintainers. 3) For systems where immediate patching is not feasible, consider disabling the erofs filesystem module if it is not required, to eliminate the attack surface. 4) Monitor system logs for WARN_ON messages related to iomap_iter_done() as an indicator of potential triggering of this vulnerability. 5) Incorporate kernel fuzzing and testing tools like syzbot into the development and QA processes to detect similar issues proactively. 6) Maintain an inventory of embedded and IoT devices running Linux kernels with erofs support to ensure timely updates. These steps go beyond generic advice by focusing on the specific filesystem and kernel component involved, emphasizing proactive detection and patch management tailored to the affected technology.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-03-27T16:39:17.987Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe4a2e
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/30/2025, 12:56:57 AM
Last updated: 7/29/2025, 12:33:57 PM
Views: 8
Related Threats
CVE-2025-9008: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-9007: Buffer Overflow in Tenda CH22
HighCVE-2025-9006: Buffer Overflow in Tenda CH22
HighCVE-2025-9005: Information Exposure Through Error Message in mtons mblog
MediumCVE-2025-9004: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.