CVE-2022-50442

7.1 HIGH

📋 TL;DR

CVE-2022-50442 is an out-of-bounds read vulnerability in the Linux kernel's NTFS3 filesystem driver. It occurs when parsing index buffers during directory operations, potentially allowing attackers to read kernel memory. This affects systems using the NTFS3 driver with untrusted NTFS filesystems.

💻 Affected Systems

Products:
  • Linux kernel with NTFS3 driver
Versions: Linux kernel versions from when NTFS3 was introduced up to fixes in stable releases (check specific kernel versions for exact range)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the NTFS3 driver (not the older NTFS driver). Requires mounting NTFS filesystems.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory disclosure leading to information leakage, potential privilege escalation if combined with other vulnerabilities, or kernel panic causing denial of service.

🟠

Likely Case

Information disclosure of kernel memory contents, potentially exposing sensitive data or system information.

🟢

If Mitigated

Limited impact with proper access controls preventing untrusted NTFS mounts and kernel hardening features like KASAN.

🌐 Internet-Facing: LOW - Requires local filesystem access or ability to mount NTFS filesystems, not directly network exploitable.
🏢 Internal Only: MEDIUM - Could be exploited by local users or through malicious NTFS filesystems mounted on the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to trigger NTFS directory operations on a malicious or corrupted NTFS filesystem. Local access or ability to mount NTFS needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in Linux kernel stable releases via commits referenced in CVE

Vendor Advisory: https://git.kernel.org/stable/c/3cd9e5b41b83bb57ac3cf9888f9fef2a6ef8ed96

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable NTFS3 driver

linux

Prevent loading of the vulnerable NTFS3 driver module

echo 'blacklist ntfs3' >> /etc/modprobe.d/blacklist-ntfs3.conf
rmmod ntfs3

Use older NTFS driver

linux

Use the legacy NTFS driver instead of NTFS3 if NTFS support is required

modprobe -r ntfs3
modprobe ntfs

🧯 If You Can't Patch

  • Restrict mounting of NTFS filesystems to trusted sources only
  • Implement strict access controls to prevent untrusted users from mounting filesystems

🔍 How to Verify

Check if Vulnerable:

Check if NTFS3 module is loaded and kernel version is vulnerable: lsmod | grep ntfs3 && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and NTFS3 module functions correctly with test NTFS mounts

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs mentioning NTFS3, KASAN reports for out-of-bounds reads in NTFS3 code

Network Indicators:

  • Not network exploitable - no network indicators

SIEM Query:

kernel: "BUG: KASAN: slab-out-of-bounds" AND "ntfs3" OR "indx_read"

🔗 References

📤 Share & Export