We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49849

btrfs: fix match incorrectly in dev_args_match_device



Description

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix match incorrectly in dev_args_match_device syzkaller found a failed assertion: assertion failed: (args->devid != (u64)-1) || args->missing, in fs/btrfs/volumes.c:6921 This can be triggered when we set devid to (u64)-1 by ioctl. In this case, the match of devid will be skipped and the match of device may succeed incorrectly. Patch 562d7b1512f7 introduced this function which is used to match device. This function contains two matching scenarios, we can distinguish them by checking the value of args->missing rather than check whether args->devid and args->uuid is default value.

Reserved 2025-05-01 | Published 2025-05-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

5578b681fbf2b22d61189a2539efd3009518b328 before c9fe4719c662e0af17eea723cf345e37719fd3c9
affected

562d7b1512f7369a19bca2883e2e8672d78f0481 before bc6c127c377010f136360552ebf91c2723081c1b
affected

562d7b1512f7369a19bca2883e2e8672d78f0481 before 0fca385d6ebc3cabb20f67bcf8a71f1448bdc001
affected

Default status
affected

5.16
affected

Any version before 5.16
unaffected

5.15.79
unaffected

6.0.9
unaffected

6.1
unaffected

References

git.kernel.org/...c/c9fe4719c662e0af17eea723cf345e37719fd3c9

git.kernel.org/...c/bc6c127c377010f136360552ebf91c2723081c1b

git.kernel.org/...c/0fca385d6ebc3cabb20f67bcf8a71f1448bdc001

cve.org (CVE-2022-49849)

nvd.nist.gov (CVE-2022-49849)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49849

Support options

Helpdesk Chat, Email, Knowledgebase