CVE-2022-50336

5.5 MEDIUM

📋 TL;DR

CVE-2022-50336 is a NULL pointer dereference vulnerability in the Linux kernel's NTFS3 filesystem driver. When mounting a specially crafted malicious NTFS filesystem image, this can cause a kernel panic leading to denial of service. Systems using the NTFS3 driver (introduced in kernel 5.15) are affected.

💻 Affected Systems

Products:
  • Linux kernel with NTFS3 driver
Versions: Linux kernel 5.15 through 5.19 (fixed in stable releases)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with NTFS3 driver enabled (CONFIG_NTFS3_FS). The older NTFS driver (CONFIG_NTFS_FS) is not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical or remote console access to reboot.

🟠

Likely Case

System crash when mounting a malicious NTFS filesystem, requiring reboot to restore service.

🟢

If Mitigated

No impact if proper access controls prevent mounting untrusted filesystems.

🌐 Internet-Facing: LOW - Requires mounting attacker-controlled filesystems, which is unlikely for internet-facing systems.
🏢 Internal Only: MEDIUM - Internal users with filesystem mounting privileges could cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to mount a malicious NTFS filesystem, which typically requires local user privileges or physical access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel 5.19.12, 5.18.19, 5.17.22, 5.16.20, 5.15.63 and later

Vendor Advisory: https://git.kernel.org/stable/c/1621734cd3047f7979da1d7d5c5444d583d8b0ed

Restart Required: No

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. For custom kernels, apply the patch from the stable kernel tree. 3. No reboot required for the patch itself, but a kernel update typically requires reboot.

🔧 Temporary Workarounds

Disable NTFS3 driver

Linux

Temporarily disable the vulnerable NTFS3 driver module

echo 'blacklist ntfs3' >> /etc/modprobe.d/blacklist-ntfs3.conf
rmmod ntfs3

Use older NTFS driver

Linux

Use the legacy NTFS driver instead of NTFS3

modprobe -r ntfs3
modprobe ntfs

🧯 If You Can't Patch

  • Restrict filesystem mounting privileges to trusted users only
  • Implement strict access controls on /dev/loop* devices to prevent mounting untrusted images

🔍 How to Verify

Check if Vulnerable:

Check if NTFS3 module is loaded and kernel version is vulnerable: lsmod | grep ntfs3 && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched: uname -r should be 5.19.12, 5.18.19, 5.17.22, 5.16.20, 5.15.63 or later

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages mentioning 'NULL pointer dereference' in attr_load_runs_vcn or ni_find_attr
  • System crash logs when mounting NTFS filesystems

Network Indicators:

  • None - this is a local filesystem vulnerability

SIEM Query:

source="kernel" AND ("NULL pointer dereference" OR "BUG: kernel" OR "Oops:") AND ("attr_load_runs_vcn" OR "ni_find_attr" OR "ntfs3")

🔗 References

📤 Share & Export