
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was identified in the Linux kernel related to lock initialization timing in the f2fs filesystem module. The issue, tracked as CVE-2022-49742, involves a lockdep warning occurring at f2fshandleerror() where spinlock(&sbi->errorlock) is called before spinlockinit() is properly initialized (NVD).
The vulnerability stems from improper lock initialization ordering in the f2fsfillsuper() function of the F2FS filesystem implementation. Specifically, the spinlock(&sbi->errorlock) is being called before its initialization via spinlockinit(), which could lead to lock-related issues during error handling (Debian Security).
The vulnerability affects various Linux distributions and their kernel packages, including Ubuntu releases 22.04 LTS, 20.04 LTS, and multiple kernel variants such as linux-aws, linux-azure, and linux-gcp (Ubuntu Security).
The issue has been resolved by moving the initialization of locks and related structures in f2fsfillsuper() to immediately after memory allocation. This ensures proper lock initialization before any potential usage in error handling paths (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."