CVE-2022-50739Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Add null pointer check for inode operations This adds a sanity check for the i_op pointer of the inode which is returned after reading Root directory MFT record. We should check the i_op is valid before trying to create the root dentry, otherwise we may encounter a NPD while mounting a image with a funny Root directory MFT record. [ 114.484325] BUG: kernel NULL pointer dereference, address: 0000000000000008 [ 114.48

Affected Packages4 packages

Linuxlinux/linux_kernel5.15.05.15.87+2
Debianlinux/linux_kernel< 6.1.4-1+2
CVEListV5linux/linux82cae269cfa953032fbb8980a7d554d60fb00b17f62506f5e45afbb01c84c3f28a2878b320a0b0f7+4
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2022-50739: In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Add null pointer check for inode operations This adds a sanity check for2025-12-24
OSV
fs/ntfs3: Add null pointer check for inode operations2025-12-24
GHSA
GHSA-9h8x-5g7f-6f2f: In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Add null pointer check for inode operations This adds a sanity check f2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: fs/ntfs3: Add null pointer check for inode operations2025-12-24
Debian
CVE-2022-50739: linux - In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: A...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50739 Impact, Exploitability, and Mitigation Steps | Wiz