Executive Summary

Informations
Name CVE-2022-49707 First vendor Publication 2025-02-26
Vendor Cve Last vendor Modification 2025-03-11

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

ext4: add reserved GDT blocks check

We capture a NULL pointer issue when resizing a corrupt ext4 image which is freshly clear resize_inode feature (not run e2fsck). It could be simply reproduced by following steps. The problem is because of the resize_inode feature was cleared, and it will convert the filesystem to meta_bg mode in ext4_resize_fs(), but the es->s_reserved_gdt_blocks was not reduced to zero, so could we mistakenly call reserve_backup_gdb() and passing an uninitialized resize_inode to it when adding new group descriptors.

mkfs.ext4 /dev/sda 3G
tune2fs -O ^resize_inode /dev/sda #forget to run requested e2fsck
mount /dev/sda /mnt
resize2fs /dev/sda 8G

========
BUG: kernel NULL pointer dereference, address: 0000000000000028
CPU: 19 PID: 3243 Comm: resize2fs Not tainted 5.18.0-rc7-00001-gfde086c5ebfd #748
...
RIP: 0010:ext4_flex_group_add+0xe08/0x2570
...
Call Trace:

ext4_resize_fs+0xbec/0x1660
__ext4_ioctl+0x1749/0x24e0
ext4_ioctl+0x12/0x20
__x64_sys_ioctl+0xa6/0x110
do_syscall_64+0x3b/0x90
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f2dd739617b
========

The fix is simple, add a check in ext4_resize_begin() to make sure that the es->s_reserved_gdt_blocks is zero when the resize_inode feature is disabled.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49707

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3541

Sources (Detail)

https://git.kernel.org/stable/c/0dc2fca8e4f9ac4a40e8424a10163369cca0cc06
https://git.kernel.org/stable/c/33b1bba31f4c784d33d2c2517964bdccdc9204cd
https://git.kernel.org/stable/c/7c921328ac760bba780bdace41f4cd045f7f1405
https://git.kernel.org/stable/c/af75c481a2e45e70f62f5942c93695e95bf7bd21
https://git.kernel.org/stable/c/b55c3cd102a6f48b90e61c44f7f3dda8c290c694
https://git.kernel.org/stable/c/b9747263b13e5290ac4d63bec47e38f701303cad
https://git.kernel.org/stable/c/bfd004a1d3a062aac300523d406ac1f3e5f1a82c
https://git.kernel.org/stable/c/fba54289176702a7caac0b64738406775817f451
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
Date Informations
2025-06-26 02:10:14
  • Multiple Updates
2025-06-25 12:23:03
  • Multiple Updates
2025-06-24 02:14:50
  • Multiple Updates
2025-05-27 02:11:33
  • Multiple Updates
2025-03-29 03:15:06
  • Multiple Updates
2025-03-28 13:35:26
  • Multiple Updates
2025-03-28 02:57:30
  • Multiple Updates
2025-03-19 00:20:42
  • Multiple Updates
2025-03-18 00:20:45
  • Multiple Updates
2025-03-14 00:21:12
  • Multiple Updates
2025-03-13 21:21:06
  • Multiple Updates
2025-03-12 05:46:05
  • Multiple Updates
2025-02-26 17:20:29
  • First insertion