CVE-2022-50299 (GCVE-0-2022-50299)
Vulnerability from cvelistv5
Published
2025-09-15 14:45
Modified
2025-09-15 14:45
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: md: Replace snprintf with scnprintf Current code produces a warning as shown below when total characters in the constituent block device names plus the slashes exceeds 200. snprintf() returns the number of characters generated from the given input, which could cause the expression “200 – len” to wrap around to a large positive number. Fix this by using scnprintf() instead, which returns the actual number of characters written into the buffer. [ 1513.267938] ------------[ cut here ]------------ [ 1513.267943] WARNING: CPU: 15 PID: 37247 at <snip>/lib/vsprintf.c:2509 vsnprintf+0x2c8/0x510 [ 1513.267944] Modules linked in: <snip> [ 1513.267969] CPU: 15 PID: 37247 Comm: mdadm Not tainted 5.4.0-1085-azure #90~18.04.1-Ubuntu [ 1513.267969] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022 [ 1513.267971] RIP: 0010:vsnprintf+0x2c8/0x510 <-snip-> [ 1513.267982] Call Trace: [ 1513.267986] snprintf+0x45/0x70 [ 1513.267990] ? disk_name+0x71/0xa0 [ 1513.267993] dump_zones+0x114/0x240 [raid0] [ 1513.267996] ? _cond_resched+0x19/0x40 [ 1513.267998] raid0_run+0x19e/0x270 [raid0] [ 1513.268000] md_run+0x5e0/0xc50 [ 1513.268003] ? security_capable+0x3f/0x60 [ 1513.268005] do_md_run+0x19/0x110 [ 1513.268006] md_ioctl+0x195e/0x1f90 [ 1513.268007] blkdev_ioctl+0x91f/0x9f0 [ 1513.268010] block_ioctl+0x3d/0x50 [ 1513.268012] do_vfs_ioctl+0xa9/0x640 [ 1513.268014] ? __fput+0x162/0x260 [ 1513.268016] ksys_ioctl+0x75/0x80 [ 1513.268017] __x64_sys_ioctl+0x1a/0x20 [ 1513.268019] do_syscall_64+0x5e/0x200 [ 1513.268021] entry_SYSCALL_64_after_hwframe+0x44/0xa9
Impacted products
Vendor Product Version
Linux Linux Version: 766038846e875740cf4c20dfc5d5b292ba47360a
Version: 766038846e875740cf4c20dfc5d5b292ba47360a
Version: 766038846e875740cf4c20dfc5d5b292ba47360a
Version: 766038846e875740cf4c20dfc5d5b292ba47360a
Version: 766038846e875740cf4c20dfc5d5b292ba47360a
Version: 766038846e875740cf4c20dfc5d5b292ba47360a
Version: 766038846e875740cf4c20dfc5d5b292ba47360a
Version: 766038846e875740cf4c20dfc5d5b292ba47360a
Create a notification for this product.
   Linux Linux Version: 4.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/md/raid0.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "3b0a2bd51f60418ecd67493586a2bb2174199de3",
              "status": "affected",
              "version": "766038846e875740cf4c20dfc5d5b292ba47360a",
              "versionType": "git"
            },
            {
              "lessThan": "897b1450abe5a67c842a5d24173ce4449ccdfa94",
              "status": "affected",
              "version": "766038846e875740cf4c20dfc5d5b292ba47360a",
              "versionType": "git"
            },
            {
              "lessThan": "97238b88583c27c9d3b4a0cedb45f816523f17c3",
              "status": "affected",
              "version": "766038846e875740cf4c20dfc5d5b292ba47360a",
              "versionType": "git"
            },
            {
              "lessThan": "76694e9ce0b2238c0a5f3ba54f9361dd3770ec78",
              "status": "affected",
              "version": "766038846e875740cf4c20dfc5d5b292ba47360a",
              "versionType": "git"
            },
            {
              "lessThan": "5d8259c9d1915a50c60c7d6e9e7fb9b7da64a175",
              "status": "affected",
              "version": "766038846e875740cf4c20dfc5d5b292ba47360a",
              "versionType": "git"
            },
            {
              "lessThan": "41ca95033a0c47cd6dace1f0a36a6eb5ebe799e6",
              "status": "affected",
              "version": "766038846e875740cf4c20dfc5d5b292ba47360a",
              "versionType": "git"
            },
            {
              "lessThan": "f95825c4e51cf9a653b0ef947ac78401fc9d3a40",
              "status": "affected",
              "version": "766038846e875740cf4c20dfc5d5b292ba47360a",
              "versionType": "git"
            },
            {
              "lessThan": "1727fd5015d8f93474148f94e34cda5aa6ad4a43",
              "status": "affected",
              "version": "766038846e875740cf4c20dfc5d5b292ba47360a",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/md/raid0.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.10"
            },
            {
              "lessThan": "4.10",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.296",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.262",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.220",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.150",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.75",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.19.*",
              "status": "unaffected",
              "version": "5.19.17",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.0.*",
              "status": "unaffected",
              "version": "6.0.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.1",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.296",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.262",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.220",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.150",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.75",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.19.17",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.0.3",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: Replace snprintf with scnprintf\n\nCurrent code produces a warning as shown below when total characters\nin the constituent block device names plus the slashes exceeds 200.\nsnprintf() returns the number of characters generated from the given\ninput, which could cause the expression \u201c200 \u2013 len\u201d to wrap around\nto a large positive number. Fix this by using scnprintf() instead,\nwhich returns the actual number of characters written into the buffer.\n\n[ 1513.267938] ------------[ cut here ]------------\n[ 1513.267943] WARNING: CPU: 15 PID: 37247 at \u003csnip\u003e/lib/vsprintf.c:2509 vsnprintf+0x2c8/0x510\n[ 1513.267944] Modules linked in:  \u003csnip\u003e\n[ 1513.267969] CPU: 15 PID: 37247 Comm: mdadm Not tainted 5.4.0-1085-azure #90~18.04.1-Ubuntu\n[ 1513.267969] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022\n[ 1513.267971] RIP: 0010:vsnprintf+0x2c8/0x510\n\u003c-snip-\u003e\n[ 1513.267982] Call Trace:\n[ 1513.267986]  snprintf+0x45/0x70\n[ 1513.267990]  ? disk_name+0x71/0xa0\n[ 1513.267993]  dump_zones+0x114/0x240 [raid0]\n[ 1513.267996]  ? _cond_resched+0x19/0x40\n[ 1513.267998]  raid0_run+0x19e/0x270 [raid0]\n[ 1513.268000]  md_run+0x5e0/0xc50\n[ 1513.268003]  ? security_capable+0x3f/0x60\n[ 1513.268005]  do_md_run+0x19/0x110\n[ 1513.268006]  md_ioctl+0x195e/0x1f90\n[ 1513.268007]  blkdev_ioctl+0x91f/0x9f0\n[ 1513.268010]  block_ioctl+0x3d/0x50\n[ 1513.268012]  do_vfs_ioctl+0xa9/0x640\n[ 1513.268014]  ? __fput+0x162/0x260\n[ 1513.268016]  ksys_ioctl+0x75/0x80\n[ 1513.268017]  __x64_sys_ioctl+0x1a/0x20\n[ 1513.268019]  do_syscall_64+0x5e/0x200\n[ 1513.268021]  entry_SYSCALL_64_after_hwframe+0x44/0xa9"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-15T14:45:55.071Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/3b0a2bd51f60418ecd67493586a2bb2174199de3"
        },
        {
          "url": "https://git.kernel.org/stable/c/897b1450abe5a67c842a5d24173ce4449ccdfa94"
        },
        {
          "url": "https://git.kernel.org/stable/c/97238b88583c27c9d3b4a0cedb45f816523f17c3"
        },
        {
          "url": "https://git.kernel.org/stable/c/76694e9ce0b2238c0a5f3ba54f9361dd3770ec78"
        },
        {
          "url": "https://git.kernel.org/stable/c/5d8259c9d1915a50c60c7d6e9e7fb9b7da64a175"
        },
        {
          "url": "https://git.kernel.org/stable/c/41ca95033a0c47cd6dace1f0a36a6eb5ebe799e6"
        },
        {
          "url": "https://git.kernel.org/stable/c/f95825c4e51cf9a653b0ef947ac78401fc9d3a40"
        },
        {
          "url": "https://git.kernel.org/stable/c/1727fd5015d8f93474148f94e34cda5aa6ad4a43"
        }
      ],
      "title": "md: Replace snprintf with scnprintf",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-50299",
    "datePublished": "2025-09-15T14:45:55.071Z",
    "dateReserved": "2025-09-15T14:18:36.812Z",
    "dateUpdated": "2025-09-15T14:45:55.071Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-50299\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-15T15:15:41.353\",\"lastModified\":\"2025-09-15T15:22:27.090\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmd: Replace snprintf with scnprintf\\n\\nCurrent code produces a warning as shown below when total characters\\nin the constituent block device names plus the slashes exceeds 200.\\nsnprintf() returns the number of characters generated from the given\\ninput, which could cause the expression \u201c200 \u2013 len\u201d to wrap around\\nto a large positive number. Fix this by using scnprintf() instead,\\nwhich returns the actual number of characters written into the buffer.\\n\\n[ 1513.267938] ------------[ cut here ]------------\\n[ 1513.267943] WARNING: CPU: 15 PID: 37247 at \u003csnip\u003e/lib/vsprintf.c:2509 vsnprintf+0x2c8/0x510\\n[ 1513.267944] Modules linked in:  \u003csnip\u003e\\n[ 1513.267969] CPU: 15 PID: 37247 Comm: mdadm Not tainted 5.4.0-1085-azure #90~18.04.1-Ubuntu\\n[ 1513.267969] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022\\n[ 1513.267971] RIP: 0010:vsnprintf+0x2c8/0x510\\n\u003c-snip-\u003e\\n[ 1513.267982] Call Trace:\\n[ 1513.267986]  snprintf+0x45/0x70\\n[ 1513.267990]  ? disk_name+0x71/0xa0\\n[ 1513.267993]  dump_zones+0x114/0x240 [raid0]\\n[ 1513.267996]  ? _cond_resched+0x19/0x40\\n[ 1513.267998]  raid0_run+0x19e/0x270 [raid0]\\n[ 1513.268000]  md_run+0x5e0/0xc50\\n[ 1513.268003]  ? security_capable+0x3f/0x60\\n[ 1513.268005]  do_md_run+0x19/0x110\\n[ 1513.268006]  md_ioctl+0x195e/0x1f90\\n[ 1513.268007]  blkdev_ioctl+0x91f/0x9f0\\n[ 1513.268010]  block_ioctl+0x3d/0x50\\n[ 1513.268012]  do_vfs_ioctl+0xa9/0x640\\n[ 1513.268014]  ? __fput+0x162/0x260\\n[ 1513.268016]  ksys_ioctl+0x75/0x80\\n[ 1513.268017]  __x64_sys_ioctl+0x1a/0x20\\n[ 1513.268019]  do_syscall_64+0x5e/0x200\\n[ 1513.268021]  entry_SYSCALL_64_after_hwframe+0x44/0xa9\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1727fd5015d8f93474148f94e34cda5aa6ad4a43\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3b0a2bd51f60418ecd67493586a2bb2174199de3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/41ca95033a0c47cd6dace1f0a36a6eb5ebe799e6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5d8259c9d1915a50c60c7d6e9e7fb9b7da64a175\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/76694e9ce0b2238c0a5f3ba54f9361dd3770ec78\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/897b1450abe5a67c842a5d24173ce4449ccdfa94\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/97238b88583c27c9d3b4a0cedb45f816523f17c3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f95825c4e51cf9a653b0ef947ac78401fc9d3a40\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…