CVE-2022-49274

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49274
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49274.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49274
Related
Published
2025-02-26T07:01:04Z
Modified
2025-02-26T07:01:04Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix crash when mount with quota enabled

There is a reported crash when mounting ocfs2 with quota enabled.

RIP: 0010:ocfs2qinfolockresinit+0x44/0x50 [ocfs2] Call Trace: ocfs2localreadinfo+0xb9/0x6f0 [ocfs2] dquotloadquotasb+0x216/0x470 dquotloadquotainode+0x85/0x100 ocfs2enablequotas+0xa0/0x1c0 [ocfs2] ocfs2fillsuper.cold+0xc8/0x1bf [ocfs2] mountbdev+0x185/0x1b0 legacygettree+0x27/0x40 vfsgettree+0x25/0xb0 pathmount+0x465/0xac0 _x64sysmount+0x103/0x140

It is caused by when initializing dqigqlock, the corresponding dqitype and dqi_sb are not properly initialized.

This issue is introduced by commit 6c85c2c72819, which wants to avoid accessing uninitialized variables in error cases. So make global quota info properly initialized.

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.17.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.17.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}