CVE-2022-50336 (GCVE-0-2022-50336)
Vulnerability from cvelistv5
Published
2025-09-15 14:49
Modified
2025-09-16 08:02
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Add null pointer check to attr_load_runs_vcn
Some metadata files are handled before MFT. This adds a null pointer
check for some corner cases that could lead to NPD while reading these
metadata files for a malformed NTFS image.
[ 240.190827] BUG: kernel NULL pointer dereference, address: 0000000000000158
[ 240.191583] #PF: supervisor read access in kernel mode
[ 240.191956] #PF: error_code(0x0000) - not-present page
[ 240.192391] PGD 0 P4D 0
[ 240.192897] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI
[ 240.193805] CPU: 0 PID: 242 Comm: mount Tainted: G B 5.19.0+ #17
[ 240.194477] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 240.195152] RIP: 0010:ni_find_attr+0xae/0x300
[ 240.195679] Code: c8 48 c7 45 88 c0 4e 5e 86 c7 00 f1 f1 f1 f1 c7 40 04 00 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 e2 d9f
[ 240.196642] RSP: 0018:ffff88800812f690 EFLAGS: 00000286
[ 240.197019] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff85ef037a
[ 240.197523] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff88e95f60
[ 240.197877] RBP: ffff88800812f738 R08: 0000000000000001 R09: fffffbfff11d2bed
[ 240.198292] R10: ffffffff88e95f67 R11: fffffbfff11d2bec R12: 0000000000000000
[ 240.198647] R13: 0000000000000080 R14: 0000000000000000 R15: 0000000000000000
[ 240.199410] FS: 00007f233c33be40(0000) GS:ffff888058200000(0000) knlGS:0000000000000000
[ 240.199895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 240.200314] CR2: 0000000000000158 CR3: 0000000004d32000 CR4: 00000000000006f0
[ 240.200839] Call Trace:
[ 240.201104] <TASK>
[ 240.201502] ? ni_load_mi+0x80/0x80
[ 240.202297] ? ___slab_alloc+0x465/0x830
[ 240.202614] attr_load_runs_vcn+0x8c/0x1a0
[ 240.202886] ? __kasan_slab_alloc+0x32/0x90
[ 240.203157] ? attr_data_write_resident+0x250/0x250
[ 240.203543] mi_read+0x133/0x2c0
[ 240.203785] mi_get+0x70/0x140
[ 240.204012] ni_load_mi_ex+0xfa/0x190
[ 240.204346] ? ni_std5+0x90/0x90
[ 240.204588] ? __kasan_kmalloc+0x88/0xb0
[ 240.204859] ni_enum_attr_ex+0xf1/0x1c0
[ 240.205107] ? ni_fname_type.part.0+0xd0/0xd0
[ 240.205600] ? ntfs_load_attr_list+0xbe/0x300
[ 240.205864] ? ntfs_cmp_names_cpu+0x125/0x180
[ 240.206157] ntfs_iget5+0x56c/0x1870
[ 240.206510] ? ntfs_get_block_bmap+0x70/0x70
[ 240.206776] ? __kasan_kmalloc+0x88/0xb0
[ 240.207030] ? set_blocksize+0x95/0x150
[ 240.207545] ntfs_fill_super+0xb8f/0x1e20
[ 240.207839] ? put_ntfs+0x1d0/0x1d0
[ 240.208069] ? vsprintf+0x20/0x20
[ 240.208467] ? mutex_unlock+0x81/0xd0
[ 240.208846] ? set_blocksize+0x95/0x150
[ 240.209221] get_tree_bdev+0x232/0x370
[ 240.209804] ? put_ntfs+0x1d0/0x1d0
[ 240.210519] ntfs_fs_get_tree+0x15/0x20
[ 240.210991] vfs_get_tree+0x4c/0x130
[ 240.211455] path_mount+0x645/0xfd0
[ 240.211806] ? putname+0x80/0xa0
[ 240.212112] ? finish_automount+0x2e0/0x2e0
[ 240.212559] ? kmem_cache_free+0x110/0x390
[ 240.212906] ? putname+0x80/0xa0
[ 240.213329] do_mount+0xd6/0xf0
[ 240.213829] ? path_mount+0xfd0/0xfd0
[ 240.214246] ? __kasan_check_write+0x14/0x20
[ 240.214774] __x64_sys_mount+0xca/0x110
[ 240.215080] do_syscall_64+0x3b/0x90
[ 240.215442] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 240.215811] RIP: 0033:0x7f233b4e948a
[ 240.216104] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008
[ 240.217615] RSP: 002b:00007fff02211ec8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5
[ 240.218718] RAX: ffffffffffffffda RBX: 0000561cdc35b060 RCX: 00007f233b4e948a
[ 240.219556] RDX: 0000561cdc35b260 RSI: 0000561cdc35b2e0 RDI: 0000561cdc363af0
[ 240.219975] RBP: 0000000000000000 R08: 0000561cdc35b280 R09: 0000000000000020
[ 240.220403] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000561cdc363af0
[ 240.220803] R13: 000
---truncated---
References
Impacted products
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/ntfs3/attrib.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "ea6b3598406c58c5d09b6f4328e09616c077597f", "status": "affected", "version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e", "versionType": "git" }, { "lessThan": "26425414bfe5d302413b956ab2469176d4ff53aa", "status": "affected", "version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e", "versionType": "git" }, { "lessThan": "1621734cd3047f7979da1d7d5c5444d583d8b0ed", "status": "affected", "version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e", "versionType": "git" }, { "lessThan": "2681631c29739509eec59cc0b34e977bb04c6cf1", "status": "affected", "version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/ntfs3/attrib.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.15" }, { "lessThan": "5.15", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.87", "versionType": "semver" }, { "lessThanOrEqual": "6.0.*", "status": "unaffected", "version": "6.0.17", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.3", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.2", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.87", "versionStartIncluding": "5.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.0.17", "versionStartIncluding": "5.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.3", "versionStartIncluding": "5.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.2", "versionStartIncluding": "5.15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Add null pointer check to attr_load_runs_vcn\n\nSome metadata files are handled before MFT. This adds a null pointer\ncheck for some corner cases that could lead to NPD while reading these\nmetadata files for a malformed NTFS image.\n\n[ 240.190827] BUG: kernel NULL pointer dereference, address: 0000000000000158\n[ 240.191583] #PF: supervisor read access in kernel mode\n[ 240.191956] #PF: error_code(0x0000) - not-present page\n[ 240.192391] PGD 0 P4D 0\n[ 240.192897] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI\n[ 240.193805] CPU: 0 PID: 242 Comm: mount Tainted: G B 5.19.0+ #17\n[ 240.194477] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 240.195152] RIP: 0010:ni_find_attr+0xae/0x300\n[ 240.195679] Code: c8 48 c7 45 88 c0 4e 5e 86 c7 00 f1 f1 f1 f1 c7 40 04 00 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 e2 d9f\n[ 240.196642] RSP: 0018:ffff88800812f690 EFLAGS: 00000286\n[ 240.197019] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff85ef037a\n[ 240.197523] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff88e95f60\n[ 240.197877] RBP: ffff88800812f738 R08: 0000000000000001 R09: fffffbfff11d2bed\n[ 240.198292] R10: ffffffff88e95f67 R11: fffffbfff11d2bec R12: 0000000000000000\n[ 240.198647] R13: 0000000000000080 R14: 0000000000000000 R15: 0000000000000000\n[ 240.199410] FS: 00007f233c33be40(0000) GS:ffff888058200000(0000) knlGS:0000000000000000\n[ 240.199895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 240.200314] CR2: 0000000000000158 CR3: 0000000004d32000 CR4: 00000000000006f0\n[ 240.200839] Call Trace:\n[ 240.201104] \u003cTASK\u003e\n[ 240.201502] ? ni_load_mi+0x80/0x80\n[ 240.202297] ? ___slab_alloc+0x465/0x830\n[ 240.202614] attr_load_runs_vcn+0x8c/0x1a0\n[ 240.202886] ? __kasan_slab_alloc+0x32/0x90\n[ 240.203157] ? attr_data_write_resident+0x250/0x250\n[ 240.203543] mi_read+0x133/0x2c0\n[ 240.203785] mi_get+0x70/0x140\n[ 240.204012] ni_load_mi_ex+0xfa/0x190\n[ 240.204346] ? ni_std5+0x90/0x90\n[ 240.204588] ? __kasan_kmalloc+0x88/0xb0\n[ 240.204859] ni_enum_attr_ex+0xf1/0x1c0\n[ 240.205107] ? ni_fname_type.part.0+0xd0/0xd0\n[ 240.205600] ? ntfs_load_attr_list+0xbe/0x300\n[ 240.205864] ? ntfs_cmp_names_cpu+0x125/0x180\n[ 240.206157] ntfs_iget5+0x56c/0x1870\n[ 240.206510] ? ntfs_get_block_bmap+0x70/0x70\n[ 240.206776] ? __kasan_kmalloc+0x88/0xb0\n[ 240.207030] ? set_blocksize+0x95/0x150\n[ 240.207545] ntfs_fill_super+0xb8f/0x1e20\n[ 240.207839] ? put_ntfs+0x1d0/0x1d0\n[ 240.208069] ? vsprintf+0x20/0x20\n[ 240.208467] ? mutex_unlock+0x81/0xd0\n[ 240.208846] ? set_blocksize+0x95/0x150\n[ 240.209221] get_tree_bdev+0x232/0x370\n[ 240.209804] ? put_ntfs+0x1d0/0x1d0\n[ 240.210519] ntfs_fs_get_tree+0x15/0x20\n[ 240.210991] vfs_get_tree+0x4c/0x130\n[ 240.211455] path_mount+0x645/0xfd0\n[ 240.211806] ? putname+0x80/0xa0\n[ 240.212112] ? finish_automount+0x2e0/0x2e0\n[ 240.212559] ? kmem_cache_free+0x110/0x390\n[ 240.212906] ? putname+0x80/0xa0\n[ 240.213329] do_mount+0xd6/0xf0\n[ 240.213829] ? path_mount+0xfd0/0xfd0\n[ 240.214246] ? __kasan_check_write+0x14/0x20\n[ 240.214774] __x64_sys_mount+0xca/0x110\n[ 240.215080] do_syscall_64+0x3b/0x90\n[ 240.215442] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 240.215811] RIP: 0033:0x7f233b4e948a\n[ 240.216104] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\n[ 240.217615] RSP: 002b:00007fff02211ec8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5\n[ 240.218718] RAX: ffffffffffffffda RBX: 0000561cdc35b060 RCX: 00007f233b4e948a\n[ 240.219556] RDX: 0000561cdc35b260 RSI: 0000561cdc35b2e0 RDI: 0000561cdc363af0\n[ 240.219975] RBP: 0000000000000000 R08: 0000561cdc35b280 R09: 0000000000000020\n[ 240.220403] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000561cdc363af0\n[ 240.220803] R13: 000\n---truncated---" } ], "providerMetadata": { "dateUpdated": "2025-09-16T08:02:09.482Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/ea6b3598406c58c5d09b6f4328e09616c077597f" }, { "url": "https://git.kernel.org/stable/c/26425414bfe5d302413b956ab2469176d4ff53aa" }, { "url": "https://git.kernel.org/stable/c/1621734cd3047f7979da1d7d5c5444d583d8b0ed" }, { "url": "https://git.kernel.org/stable/c/2681631c29739509eec59cc0b34e977bb04c6cf1" } ], "title": "fs/ntfs3: Add null pointer check to attr_load_runs_vcn", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2022-50336", "datePublished": "2025-09-15T14:49:51.195Z", "dateReserved": "2025-09-15T14:18:36.817Z", "dateUpdated": "2025-09-16T08:02:09.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-50336\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-15T15:15:45.933\",\"lastModified\":\"2025-09-15T15:22:27.090\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfs/ntfs3: Add null pointer check to attr_load_runs_vcn\\n\\nSome metadata files are handled before MFT. This adds a null pointer\\ncheck for some corner cases that could lead to NPD while reading these\\nmetadata files for a malformed NTFS image.\\n\\n[ 240.190827] BUG: kernel NULL pointer dereference, address: 0000000000000158\\n[ 240.191583] #PF: supervisor read access in kernel mode\\n[ 240.191956] #PF: error_code(0x0000) - not-present page\\n[ 240.192391] PGD 0 P4D 0\\n[ 240.192897] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI\\n[ 240.193805] CPU: 0 PID: 242 Comm: mount Tainted: G B 5.19.0+ #17\\n[ 240.194477] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\\n[ 240.195152] RIP: 0010:ni_find_attr+0xae/0x300\\n[ 240.195679] Code: c8 48 c7 45 88 c0 4e 5e 86 c7 00 f1 f1 f1 f1 c7 40 04 00 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 e2 d9f\\n[ 240.196642] RSP: 0018:ffff88800812f690 EFLAGS: 00000286\\n[ 240.197019] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff85ef037a\\n[ 240.197523] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff88e95f60\\n[ 240.197877] RBP: ffff88800812f738 R08: 0000000000000001 R09: fffffbfff11d2bed\\n[ 240.198292] R10: ffffffff88e95f67 R11: fffffbfff11d2bec R12: 0000000000000000\\n[ 240.198647] R13: 0000000000000080 R14: 0000000000000000 R15: 0000000000000000\\n[ 240.199410] FS: 00007f233c33be40(0000) GS:ffff888058200000(0000) knlGS:0000000000000000\\n[ 240.199895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\n[ 240.200314] CR2: 0000000000000158 CR3: 0000000004d32000 CR4: 00000000000006f0\\n[ 240.200839] Call Trace:\\n[ 240.201104] \u003cTASK\u003e\\n[ 240.201502] ? ni_load_mi+0x80/0x80\\n[ 240.202297] ? ___slab_alloc+0x465/0x830\\n[ 240.202614] attr_load_runs_vcn+0x8c/0x1a0\\n[ 240.202886] ? __kasan_slab_alloc+0x32/0x90\\n[ 240.203157] ? attr_data_write_resident+0x250/0x250\\n[ 240.203543] mi_read+0x133/0x2c0\\n[ 240.203785] mi_get+0x70/0x140\\n[ 240.204012] ni_load_mi_ex+0xfa/0x190\\n[ 240.204346] ? ni_std5+0x90/0x90\\n[ 240.204588] ? __kasan_kmalloc+0x88/0xb0\\n[ 240.204859] ni_enum_attr_ex+0xf1/0x1c0\\n[ 240.205107] ? ni_fname_type.part.0+0xd0/0xd0\\n[ 240.205600] ? ntfs_load_attr_list+0xbe/0x300\\n[ 240.205864] ? ntfs_cmp_names_cpu+0x125/0x180\\n[ 240.206157] ntfs_iget5+0x56c/0x1870\\n[ 240.206510] ? ntfs_get_block_bmap+0x70/0x70\\n[ 240.206776] ? __kasan_kmalloc+0x88/0xb0\\n[ 240.207030] ? set_blocksize+0x95/0x150\\n[ 240.207545] ntfs_fill_super+0xb8f/0x1e20\\n[ 240.207839] ? put_ntfs+0x1d0/0x1d0\\n[ 240.208069] ? vsprintf+0x20/0x20\\n[ 240.208467] ? mutex_unlock+0x81/0xd0\\n[ 240.208846] ? set_blocksize+0x95/0x150\\n[ 240.209221] get_tree_bdev+0x232/0x370\\n[ 240.209804] ? put_ntfs+0x1d0/0x1d0\\n[ 240.210519] ntfs_fs_get_tree+0x15/0x20\\n[ 240.210991] vfs_get_tree+0x4c/0x130\\n[ 240.211455] path_mount+0x645/0xfd0\\n[ 240.211806] ? putname+0x80/0xa0\\n[ 240.212112] ? finish_automount+0x2e0/0x2e0\\n[ 240.212559] ? kmem_cache_free+0x110/0x390\\n[ 240.212906] ? putname+0x80/0xa0\\n[ 240.213329] do_mount+0xd6/0xf0\\n[ 240.213829] ? path_mount+0xfd0/0xfd0\\n[ 240.214246] ? __kasan_check_write+0x14/0x20\\n[ 240.214774] __x64_sys_mount+0xca/0x110\\n[ 240.215080] do_syscall_64+0x3b/0x90\\n[ 240.215442] entry_SYSCALL_64_after_hwframe+0x63/0xcd\\n[ 240.215811] RIP: 0033:0x7f233b4e948a\\n[ 240.216104] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\\n[ 240.217615] RSP: 002b:00007fff02211ec8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5\\n[ 240.218718] RAX: ffffffffffffffda RBX: 0000561cdc35b060 RCX: 00007f233b4e948a\\n[ 240.219556] RDX: 0000561cdc35b260 RSI: 0000561cdc35b2e0 RDI: 0000561cdc363af0\\n[ 240.219975] RBP: 0000000000000000 R08: 0000561cdc35b280 R09: 0000000000000020\\n[ 240.220403] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000561cdc363af0\\n[ 240.220803] R13: 000\\n---truncated---\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1621734cd3047f7979da1d7d5c5444d583d8b0ed\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/26425414bfe5d302413b956ab2469176d4ff53aa\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2681631c29739509eec59cc0b34e977bb04c6cf1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ea6b3598406c58c5d09b6f4328e09616c077597f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…