CVE-2022-50262 (GCVE-0-2022-50262)
Vulnerability from cvelistv5
Published
2025-09-15 14:20
Modified
2025-09-16 08:02
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Validate BOOT record_size
When the NTFS BOOT record_size field < 0, it represents a
shift value. However, there is no sanity check on the shift result
and the sbi->record_bits calculation through blksize_bits() assumes
the size always > 256, which could lead to NPD while mounting a
malformed NTFS image.
[ 318.675159] BUG: kernel NULL pointer dereference, address: 0000000000000158
[ 318.675682] #PF: supervisor read access in kernel mode
[ 318.675869] #PF: error_code(0x0000) - not-present page
[ 318.676246] PGD 0 P4D 0
[ 318.676502] Oops: 0000 [#1] PREEMPT SMP NOPTI
[ 318.676934] CPU: 0 PID: 259 Comm: mount Not tainted 5.19.0 #5
[ 318.677289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 318.678136] RIP: 0010:ni_find_attr+0x2d/0x1c0
[ 318.678656] Code: 89 ca 4d 89 c7 41 56 41 55 41 54 41 89 cc 55 48 89 fd 53 48 89 d3 48 83 ec 20 65 48 8b 04 25 28 00 00 00 48 89 44 24 180
[ 318.679848] RSP: 0018:ffffa6c8c0297bd8 EFLAGS: 00000246
[ 318.680104] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000080
[ 318.680790] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 318.681679] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[ 318.682577] R10: 0000000000000000 R11: 0000000000000005 R12: 0000000000000080
[ 318.683015] R13: ffff8d5582e68400 R14: 0000000000000100 R15: 0000000000000000
[ 318.683618] FS: 00007fd9e1c81e40(0000) GS:ffff8d55fdc00000(0000) knlGS:0000000000000000
[ 318.684280] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 318.684651] CR2: 0000000000000158 CR3: 0000000002e1a000 CR4: 00000000000006f0
[ 318.685623] Call Trace:
[ 318.686607] <TASK>
[ 318.686872] ? ntfs_alloc_inode+0x1a/0x60
[ 318.687235] attr_load_runs_vcn+0x2b/0xa0
[ 318.687468] mi_read+0xbb/0x250
[ 318.687576] ntfs_iget5+0x114/0xd90
[ 318.687750] ntfs_fill_super+0x588/0x11b0
[ 318.687953] ? put_ntfs+0x130/0x130
[ 318.688065] ? snprintf+0x49/0x70
[ 318.688164] ? put_ntfs+0x130/0x130
[ 318.688256] get_tree_bdev+0x16a/0x260
[ 318.688407] vfs_get_tree+0x20/0xb0
[ 318.688519] path_mount+0x2dc/0x9b0
[ 318.688877] do_mount+0x74/0x90
[ 318.689142] __x64_sys_mount+0x89/0xd0
[ 318.689636] do_syscall_64+0x3b/0x90
[ 318.689998] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 318.690318] RIP: 0033:0x7fd9e133c48a
[ 318.690687] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008
[ 318.691357] RSP: 002b:00007ffd374406c8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5
[ 318.691632] RAX: ffffffffffffffda RBX: 0000564d0b051080 RCX: 00007fd9e133c48a
[ 318.691920] RDX: 0000564d0b051280 RSI: 0000564d0b051300 RDI: 0000564d0b0596a0
[ 318.692123] RBP: 0000000000000000 R08: 0000564d0b0512a0 R09: 0000000000000020
[ 318.692349] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564d0b0596a0
[ 318.692673] R13: 0000564d0b051280 R14: 0000000000000000 R15: 00000000ffffffff
[ 318.693007] </TASK>
[ 318.693271] Modules linked in:
[ 318.693614] CR2: 0000000000000158
[ 318.694446] ---[ end trace 0000000000000000 ]---
[ 318.694779] RIP: 0010:ni_find_attr+0x2d/0x1c0
[ 318.694952] Code: 89 ca 4d 89 c7 41 56 41 55 41 54 41 89 cc 55 48 89 fd 53 48 89 d3 48 83 ec 20 65 48 8b 04 25 28 00 00 00 48 89 44 24 180
[ 318.696042] RSP: 0018:ffffa6c8c0297bd8 EFLAGS: 00000246
[ 318.696531] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000080
[ 318.698114] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 318.699286] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[ 318.699795] R10: 0000000000000000 R11: 0000000000000005 R12: 0000000000000080
[ 318.700236] R13: ffff8d5582e68400 R14: 0000000000000100 R15: 0000000000000000
[ 318.700973] FS: 00007fd9e1c81e40(0000) GS:ffff8d55fdc00000(0000) knlGS:0000000000000000
[
---truncated---
References
Impacted products
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/ntfs3/super.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "af7a195deae349f15baa765d000a5188920d61dd", "status": "affected", "version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e", "versionType": "git" }, { "lessThan": "8702e0dc987014f6d77740b693340f91344fd0ae", "status": "affected", "version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e", "versionType": "git" }, { "lessThan": "db91a9c59162a9c56792ded88160442c0a2dabd5", "status": "affected", "version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e", "versionType": "git" }, { "lessThan": "0b66046266690454dc04e6307bcff4a5605b42a1", "status": "affected", "version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/ntfs3/super.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.15" }, { "lessThan": "5.15", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.87", "versionType": "semver" }, { "lessThanOrEqual": "6.0.*", "status": "unaffected", "version": "6.0.17", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.3", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.2", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.87", "versionStartIncluding": "5.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.0.17", "versionStartIncluding": "5.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.3", "versionStartIncluding": "5.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.2", "versionStartIncluding": "5.15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Validate BOOT record_size\n\nWhen the NTFS BOOT record_size field \u003c 0, it represents a\nshift value. However, there is no sanity check on the shift result\nand the sbi-\u003erecord_bits calculation through blksize_bits() assumes\nthe size always \u003e 256, which could lead to NPD while mounting a\nmalformed NTFS image.\n\n[ 318.675159] BUG: kernel NULL pointer dereference, address: 0000000000000158\n[ 318.675682] #PF: supervisor read access in kernel mode\n[ 318.675869] #PF: error_code(0x0000) - not-present page\n[ 318.676246] PGD 0 P4D 0\n[ 318.676502] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[ 318.676934] CPU: 0 PID: 259 Comm: mount Not tainted 5.19.0 #5\n[ 318.677289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 318.678136] RIP: 0010:ni_find_attr+0x2d/0x1c0\n[ 318.678656] Code: 89 ca 4d 89 c7 41 56 41 55 41 54 41 89 cc 55 48 89 fd 53 48 89 d3 48 83 ec 20 65 48 8b 04 25 28 00 00 00 48 89 44 24 180\n[ 318.679848] RSP: 0018:ffffa6c8c0297bd8 EFLAGS: 00000246\n[ 318.680104] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000080\n[ 318.680790] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\n[ 318.681679] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\n[ 318.682577] R10: 0000000000000000 R11: 0000000000000005 R12: 0000000000000080\n[ 318.683015] R13: ffff8d5582e68400 R14: 0000000000000100 R15: 0000000000000000\n[ 318.683618] FS: 00007fd9e1c81e40(0000) GS:ffff8d55fdc00000(0000) knlGS:0000000000000000\n[ 318.684280] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 318.684651] CR2: 0000000000000158 CR3: 0000000002e1a000 CR4: 00000000000006f0\n[ 318.685623] Call Trace:\n[ 318.686607] \u003cTASK\u003e\n[ 318.686872] ? ntfs_alloc_inode+0x1a/0x60\n[ 318.687235] attr_load_runs_vcn+0x2b/0xa0\n[ 318.687468] mi_read+0xbb/0x250\n[ 318.687576] ntfs_iget5+0x114/0xd90\n[ 318.687750] ntfs_fill_super+0x588/0x11b0\n[ 318.687953] ? put_ntfs+0x130/0x130\n[ 318.688065] ? snprintf+0x49/0x70\n[ 318.688164] ? put_ntfs+0x130/0x130\n[ 318.688256] get_tree_bdev+0x16a/0x260\n[ 318.688407] vfs_get_tree+0x20/0xb0\n[ 318.688519] path_mount+0x2dc/0x9b0\n[ 318.688877] do_mount+0x74/0x90\n[ 318.689142] __x64_sys_mount+0x89/0xd0\n[ 318.689636] do_syscall_64+0x3b/0x90\n[ 318.689998] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 318.690318] RIP: 0033:0x7fd9e133c48a\n[ 318.690687] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\n[ 318.691357] RSP: 002b:00007ffd374406c8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5\n[ 318.691632] RAX: ffffffffffffffda RBX: 0000564d0b051080 RCX: 00007fd9e133c48a\n[ 318.691920] RDX: 0000564d0b051280 RSI: 0000564d0b051300 RDI: 0000564d0b0596a0\n[ 318.692123] RBP: 0000000000000000 R08: 0000564d0b0512a0 R09: 0000000000000020\n[ 318.692349] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564d0b0596a0\n[ 318.692673] R13: 0000564d0b051280 R14: 0000000000000000 R15: 00000000ffffffff\n[ 318.693007] \u003c/TASK\u003e\n[ 318.693271] Modules linked in:\n[ 318.693614] CR2: 0000000000000158\n[ 318.694446] ---[ end trace 0000000000000000 ]---\n[ 318.694779] RIP: 0010:ni_find_attr+0x2d/0x1c0\n[ 318.694952] Code: 89 ca 4d 89 c7 41 56 41 55 41 54 41 89 cc 55 48 89 fd 53 48 89 d3 48 83 ec 20 65 48 8b 04 25 28 00 00 00 48 89 44 24 180\n[ 318.696042] RSP: 0018:ffffa6c8c0297bd8 EFLAGS: 00000246\n[ 318.696531] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000080\n[ 318.698114] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\n[ 318.699286] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\n[ 318.699795] R10: 0000000000000000 R11: 0000000000000005 R12: 0000000000000080\n[ 318.700236] R13: ffff8d5582e68400 R14: 0000000000000100 R15: 0000000000000000\n[ 318.700973] FS: 00007fd9e1c81e40(0000) GS:ffff8d55fdc00000(0000) knlGS:0000000000000000\n[\n---truncated---" } ], "providerMetadata": { "dateUpdated": "2025-09-16T08:02:03.947Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/af7a195deae349f15baa765d000a5188920d61dd" }, { "url": "https://git.kernel.org/stable/c/8702e0dc987014f6d77740b693340f91344fd0ae" }, { "url": "https://git.kernel.org/stable/c/db91a9c59162a9c56792ded88160442c0a2dabd5" }, { "url": "https://git.kernel.org/stable/c/0b66046266690454dc04e6307bcff4a5605b42a1" } ], "title": "fs/ntfs3: Validate BOOT record_size", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2022-50262", "datePublished": "2025-09-15T14:20:58.578Z", "dateReserved": "2025-09-15T13:58:00.974Z", "dateUpdated": "2025-09-16T08:02:03.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-50262\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-15T15:15:36.080\",\"lastModified\":\"2025-09-15T15:22:27.090\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfs/ntfs3: Validate BOOT record_size\\n\\nWhen the NTFS BOOT record_size field \u003c 0, it represents a\\nshift value. However, there is no sanity check on the shift result\\nand the sbi-\u003erecord_bits calculation through blksize_bits() assumes\\nthe size always \u003e 256, which could lead to NPD while mounting a\\nmalformed NTFS image.\\n\\n[ 318.675159] BUG: kernel NULL pointer dereference, address: 0000000000000158\\n[ 318.675682] #PF: supervisor read access in kernel mode\\n[ 318.675869] #PF: error_code(0x0000) - not-present page\\n[ 318.676246] PGD 0 P4D 0\\n[ 318.676502] Oops: 0000 [#1] PREEMPT SMP NOPTI\\n[ 318.676934] CPU: 0 PID: 259 Comm: mount Not tainted 5.19.0 #5\\n[ 318.677289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\\n[ 318.678136] RIP: 0010:ni_find_attr+0x2d/0x1c0\\n[ 318.678656] Code: 89 ca 4d 89 c7 41 56 41 55 41 54 41 89 cc 55 48 89 fd 53 48 89 d3 48 83 ec 20 65 48 8b 04 25 28 00 00 00 48 89 44 24 180\\n[ 318.679848] RSP: 0018:ffffa6c8c0297bd8 EFLAGS: 00000246\\n[ 318.680104] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000080\\n[ 318.680790] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\\n[ 318.681679] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\\n[ 318.682577] R10: 0000000000000000 R11: 0000000000000005 R12: 0000000000000080\\n[ 318.683015] R13: ffff8d5582e68400 R14: 0000000000000100 R15: 0000000000000000\\n[ 318.683618] FS: 00007fd9e1c81e40(0000) GS:ffff8d55fdc00000(0000) knlGS:0000000000000000\\n[ 318.684280] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\n[ 318.684651] CR2: 0000000000000158 CR3: 0000000002e1a000 CR4: 00000000000006f0\\n[ 318.685623] Call Trace:\\n[ 318.686607] \u003cTASK\u003e\\n[ 318.686872] ? ntfs_alloc_inode+0x1a/0x60\\n[ 318.687235] attr_load_runs_vcn+0x2b/0xa0\\n[ 318.687468] mi_read+0xbb/0x250\\n[ 318.687576] ntfs_iget5+0x114/0xd90\\n[ 318.687750] ntfs_fill_super+0x588/0x11b0\\n[ 318.687953] ? put_ntfs+0x130/0x130\\n[ 318.688065] ? snprintf+0x49/0x70\\n[ 318.688164] ? put_ntfs+0x130/0x130\\n[ 318.688256] get_tree_bdev+0x16a/0x260\\n[ 318.688407] vfs_get_tree+0x20/0xb0\\n[ 318.688519] path_mount+0x2dc/0x9b0\\n[ 318.688877] do_mount+0x74/0x90\\n[ 318.689142] __x64_sys_mount+0x89/0xd0\\n[ 318.689636] do_syscall_64+0x3b/0x90\\n[ 318.689998] entry_SYSCALL_64_after_hwframe+0x63/0xcd\\n[ 318.690318] RIP: 0033:0x7fd9e133c48a\\n[ 318.690687] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\\n[ 318.691357] RSP: 002b:00007ffd374406c8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5\\n[ 318.691632] RAX: ffffffffffffffda RBX: 0000564d0b051080 RCX: 00007fd9e133c48a\\n[ 318.691920] RDX: 0000564d0b051280 RSI: 0000564d0b051300 RDI: 0000564d0b0596a0\\n[ 318.692123] RBP: 0000000000000000 R08: 0000564d0b0512a0 R09: 0000000000000020\\n[ 318.692349] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564d0b0596a0\\n[ 318.692673] R13: 0000564d0b051280 R14: 0000000000000000 R15: 00000000ffffffff\\n[ 318.693007] \u003c/TASK\u003e\\n[ 318.693271] Modules linked in:\\n[ 318.693614] CR2: 0000000000000158\\n[ 318.694446] ---[ end trace 0000000000000000 ]---\\n[ 318.694779] RIP: 0010:ni_find_attr+0x2d/0x1c0\\n[ 318.694952] Code: 89 ca 4d 89 c7 41 56 41 55 41 54 41 89 cc 55 48 89 fd 53 48 89 d3 48 83 ec 20 65 48 8b 04 25 28 00 00 00 48 89 44 24 180\\n[ 318.696042] RSP: 0018:ffffa6c8c0297bd8 EFLAGS: 00000246\\n[ 318.696531] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000080\\n[ 318.698114] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\\n[ 318.699286] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\\n[ 318.699795] R10: 0000000000000000 R11: 0000000000000005 R12: 0000000000000080\\n[ 318.700236] R13: ffff8d5582e68400 R14: 0000000000000100 R15: 0000000000000000\\n[ 318.700973] FS: 00007fd9e1c81e40(0000) GS:ffff8d55fdc00000(0000) knlGS:0000000000000000\\n[\\n---truncated---\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0b66046266690454dc04e6307bcff4a5605b42a1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8702e0dc987014f6d77740b693340f91344fd0ae\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/af7a195deae349f15baa765d000a5188920d61dd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/db91a9c59162a9c56792ded88160442c0a2dabd5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…