CVE-2022-50507

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/10/2025
Last modified:
06/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> fs/ntfs3: Validate data run offset<br /> <br /> This adds sanity checks for data run offset. We should make sure data<br /> run offset is legit before trying to unpack them, otherwise we may<br /> encounter use-after-free or some unexpected memory access behaviors.<br /> <br /> [ 82.940342] BUG: KASAN: use-after-free in run_unpack+0x2e3/0x570<br /> [ 82.941180] Read of size 1 at addr ffff888008a8487f by task mount/240<br /> [ 82.941670]<br /> [ 82.942069] CPU: 0 PID: 240 Comm: mount Not tainted 5.19.0+ #15<br /> [ 82.942482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014<br /> [ 82.943720] Call Trace:<br /> [ 82.944204] <br /> [ 82.944471] dump_stack_lvl+0x49/0x63<br /> [ 82.944908] print_report.cold+0xf5/0x67b<br /> [ 82.945141] ? __wait_on_bit+0x106/0x120<br /> [ 82.945750] ? run_unpack+0x2e3/0x570<br /> [ 82.946626] kasan_report+0xa7/0x120<br /> [ 82.947046] ? run_unpack+0x2e3/0x570<br /> [ 82.947280] __asan_load1+0x51/0x60<br /> [ 82.947483] run_unpack+0x2e3/0x570<br /> [ 82.947709] ? memcpy+0x4e/0x70<br /> [ 82.947927] ? run_pack+0x7a0/0x7a0<br /> [ 82.948158] run_unpack_ex+0xad/0x3f0<br /> [ 82.948399] ? mi_enum_attr+0x14a/0x200<br /> [ 82.948717] ? run_unpack+0x570/0x570<br /> [ 82.949072] ? ni_enum_attr_ex+0x1b2/0x1c0<br /> [ 82.949332] ? ni_fname_type.part.0+0xd0/0xd0<br /> [ 82.949611] ? mi_read+0x262/0x2c0<br /> [ 82.949970] ? ntfs_cmp_names_cpu+0x125/0x180<br /> [ 82.950249] ntfs_iget5+0x632/0x1870<br /> [ 82.950621] ? ntfs_get_block_bmap+0x70/0x70<br /> [ 82.951192] ? evict+0x223/0x280<br /> [ 82.951525] ? iput.part.0+0x286/0x320<br /> [ 82.951969] ntfs_fill_super+0x1321/0x1e20<br /> [ 82.952436] ? put_ntfs+0x1d0/0x1d0<br /> [ 82.952822] ? vsprintf+0x20/0x20<br /> [ 82.953188] ? mutex_unlock+0x81/0xd0<br /> [ 82.953379] ? set_blocksize+0x95/0x150<br /> [ 82.954001] get_tree_bdev+0x232/0x370<br /> [ 82.954438] ? put_ntfs+0x1d0/0x1d0<br /> [ 82.954700] ntfs_fs_get_tree+0x15/0x20<br /> [ 82.955049] vfs_get_tree+0x4c/0x130<br /> [ 82.955292] path_mount+0x645/0xfd0<br /> [ 82.955615] ? putname+0x80/0xa0<br /> [ 82.955955] ? finish_automount+0x2e0/0x2e0<br /> [ 82.956310] ? kmem_cache_free+0x110/0x390<br /> [ 82.956723] ? putname+0x80/0xa0<br /> [ 82.957023] do_mount+0xd6/0xf0<br /> [ 82.957411] ? path_mount+0xfd0/0xfd0<br /> [ 82.957638] ? __kasan_check_write+0x14/0x20<br /> [ 82.957948] __x64_sys_mount+0xca/0x110<br /> [ 82.958310] do_syscall_64+0x3b/0x90<br /> [ 82.958719] entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> [ 82.959341] RIP: 0033:0x7fd0d1ce948a<br /> [ 82.960193] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008<br /> [ 82.961532] RSP: 002b:00007ffe59ff69a8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5<br /> [ 82.962527] RAX: ffffffffffffffda RBX: 0000564dcc107060 RCX: 00007fd0d1ce948a<br /> [ 82.963266] RDX: 0000564dcc107260 RSI: 0000564dcc1072e0 RDI: 0000564dcc10fce0<br /> [ 82.963686] RBP: 0000000000000000 R08: 0000564dcc107280 R09: 0000000000000020<br /> [ 82.964272] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564dcc10fce0<br /> [ 82.964785] R13: 0000564dcc107260 R14: 0000000000000000 R15: 00000000ffffffff

Impact