Cyber Posture

CVE-2022-49738

High

Published: 27 March 2025

Published
27 March 2025
Modified
01 October 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS Score 0.0009 26.1th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.

Security Summary

CVE-2022-49738 is a slab-out-of-bounds read vulnerability in the Linux kernel's f2fs filesystem implementation. The issue arises in the is_alive() function within the garbage collection code (gc_data_segment), where a missing sanity check on the i_extra_isize field leads to invalid memory access via offset_in_addr and data_blkaddr macros. This was detected by syzbot during kernel writeback operations on a tainted 6.1.0-rc4 kernel, resulting in a KASAN-reported read of 4 bytes at an invalid slab address.

A local attacker with low privileges (PR:L) can exploit this vulnerability with low attack complexity (AC:L) and no user interaction (UI:N) in a local attack vector (AV:L). Successful exploitation triggers the out-of-bounds read during f2fs garbage collection, potentially allowing high confidentiality impact through kernel memory disclosure (C:H) and high availability impact via system crash or denial of service (A:H), with no integrity impact (I:N). The CVSS v3.1 base score is 7.1, mapped to CWE-125 (Out-of-bounds Read).

Mitigation involves applying upstream patches from the provided stable kernel commit references, which add the necessary sanity check on i_extra_isize in the affected code path. Key commits include 5b25035fb888cb2f78bf0b9c9f95b1dc54480d36, 914e38f02a490dafd980ff0f39cccedc074deb29, 97ccfffcc061e54ce87e4a51a40e2e9cb0b7076a, d3b7b4afd6b2c344eabf9cc26b8bfa903c164c7c, and e5142a4935c1f15841d06047b8130078fc4d7b8f, backported to relevant stable branches.

Details

CWE(s)
CWE-125

Affected Products

linux
linux kernel
≤ 5.4.232 · 5.5 — 5.10.168 · 5.11 — 5.15.93

MITRE ATT&CK Enterprise Techniques

T1212 Exploitation for Credential Access Credential Access
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Kernel OOB read enables memory disclosure for credential access via exploitation (T1212); also facilitates system crash/DoS via application or system exploitation (T1499.004).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References