CVE-2022-50313 PUBLISHED

Reported by Linux · Published September 15, 2025

In the Linux kernel, the following vulnerability has been resolved: erofs: fix order >= MAX_ORDER warning due to crafted negative i_size As syzbot reported [1], the root cause is that i_size field is a signed type, and negative i_size is also less than EROFS_BLKSIZ. As a consequence, it's handled as fast symlink unexpectedly. Let's fall back to the generic path to deal with such unusual i_size. [1] https://lore.kernel.org/r/000000000000ac8efa05e7feaa1f@google.com

EPSS 0.02% · 2.9th percentile

Risk Scores

EPSS Score
0.02%
2.9th percentile

Affected Products

VendorProductVersions
LinuxLinux431339ba90423a038914c6032bfd71f0ba7ef2f2, 431339ba90423a038914c6032bfd71f0ba7ef2f2, 431339ba90423a038914c6032bfd71f0ba7ef2f2
LinuxLinux4.19, 0, 5.4.289
LinuxLinux431339ba90423a038914c6032bfd71f0ba7ef2f2, 431339ba90423a038914c6032bfd71f0ba7ef2f2, 431339ba90423a038914c6032bfd71f0ba7ef2f2
linuxlinux_kernel4.19, 4.19, 4.19

Timeline

References

Open in Interactive Console →