In the Linux kernel, the following vulnerability has been resolved:
erofs: fix order >= MAX_ORDER warning due to crafted negative i_size
As syzbot reported [1], the root cause is that i_size field is a
signed type, and negative i_size is also less than EROFS_BLKSIZ.
As a consequence, it's handled as fast symlink unexpectedly.
Let's fall back to the generic path to deal with such unusual i_size.
[1] https://lore.kernel.org/r/000000000000ac8efa05e7feaa1f@google.com
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-09-15 15:15
Updated : 2025-12-04 15:22
NVD link : CVE-2022-50313
Mitre link : CVE-2022-50313
CVE.ORG link : CVE-2022-50313
JSON object : View
Products Affected
linux
- linux_kernel
CWE
