CVE-2022-50519 PUBLISHED

nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure

Assigner: Linux
Reserved: 07.10.2025 Published: 07.10.2025 Updated: 07.10.2025

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure

If creation or finalization of a checkpoint fails due to anomalies in the checkpoint metadata on disk, a kernel warning is generated.

This patch replaces the WARN_ONs by nilfs_error, so that a kernel, booted with panic_on_warn, does not panic. A nilfs_error is appropriate here to handle the abnormal filesystem condition.

This also replaces the detected error codes with an I/O error so that neither of the internal error codes is returned to callers.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to b63026b5e13040cd5afa11769dd0d9e1504b031a (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to ae16440c44ae2acda6d72aff9d74eccf8967dae5 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to bf98be80cbe3b4e6c86c36ed00457389aca3eb15 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 259c0f68168ac6a598db3486597b10e74d625db0 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 8a18fdc5ae8e6d7ac33c6ee0a2e5f9f1414ef412 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to c0c3d3d3ea41cb5228ee90568bb953f9a56c3227 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 090fcfb6edeb9367a915b2749e2bd1f8b48d8898 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 5c0776b5bc31de7cd28afb558fae37a20f33602e (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 723ac751208f6d6540191689cfbf6c77135a7a1b (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • unaffected from 4.9.331 to 4.9.* (incl.)
  • unaffected from 4.14.296 to 4.14.* (incl.)
  • unaffected from 4.19.262 to 4.19.* (incl.)
  • unaffected from 5.4.218 to 5.4.* (incl.)
  • unaffected from 5.10.148 to 5.10.* (incl.)
  • unaffected from 5.15.74 to 5.15.* (incl.)
  • unaffected from 5.19.16 to 5.19.* (incl.)
  • unaffected from 6.0.2 to 6.0.* (incl.)
  • unaffected from 6.1 to * (incl.)

References