In the Linux kernel, the following vulnerability has been resolved:
erofs: fix order >= MAX_ORDER warning due to crafted negative i_size
As syzbot reported [1], the root cause is that i_size field is a
signed type, and negative i_size is also less than EROFS_BLKSIZ.
As a consequence, it's handled as fast symlink unexpectedly.
Let's fall back to the generic path to deal with such unusual i_size.
[1] https://lore.kernel.org/r/000000000000ac8efa05e7feaa1f@google.com
References
Configurations
Configuration 1 (hide)
|
History
04 Dec 2025, 15:22
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/0ab621fcdff1a58ff4de51a8590fa92a0ecd34be - Patch | |
| References | () https://git.kernel.org/stable/c/17a0cdbd7b0cf0fc0d7ca4187a67f8f1c18c291f - Patch | |
| References | () https://git.kernel.org/stable/c/1dd73601a1cba37a0ed5f89a8662c90191df5873 - Patch | |
| References | () https://git.kernel.org/stable/c/6235fb899b25fd287d5e42635ff82196395708cc - Patch | |
| References | () https://git.kernel.org/stable/c/acc2f40b980c61a9178b72cdedd150b829064997 - Patch | |
| References | () https://git.kernel.org/stable/c/b6c8330f5b0f22149957a2e4977fd0f01a9db7cd - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
15 Sep 2025, 15:22
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-15 15:15
Updated : 2025-12-04 15:22
NVD link : CVE-2022-50313
Mitre link : CVE-2022-50313
CVE.ORG link : CVE-2022-50313
JSON object : View
Products Affected
linux
- linux_kernel
CWE
