{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50739","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-24T13:02:21.542Z","datePublished":"2025-12-24T13:05:37.468Z","dateUpdated":"2026-05-11T19:24:34.879Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:24:34.879Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Add null pointer check for inode operations\n\nThis adds a sanity check for the i_op pointer of the inode which is\nreturned after reading Root directory MFT record. We should check the\ni_op is valid before trying to create the root dentry, otherwise we may\nencounter a NPD while mounting a image with a funny Root directory MFT\nrecord.\n\n[  114.484325] BUG: kernel NULL pointer dereference, address: 0000000000000008\n[  114.484811] #PF: supervisor read access in kernel mode\n[  114.485084] #PF: error_code(0x0000) - not-present page\n[  114.485606] PGD 0 P4D 0\n[  114.485975] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI\n[  114.486570] CPU: 0 PID: 237 Comm: mount Tainted: G    B              6.0.0-rc4 #28\n[  114.486977] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[  114.488169] RIP: 0010:d_flags_for_inode+0xe0/0x110\n[  114.488816] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241\n[  114.490326] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296\n[  114.490695] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea\n[  114.490986] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff87abd020\n[  114.491364] RBP: ffff8880065e7ac8 R08: 0000000000000001 R09: fffffbfff0f57a05\n[  114.491675] R10: ffffffff87abd027 R11: fffffbfff0f57a04 R12: 0000000000000000\n[  114.491954] R13: 0000000000000008 R14: 0000000000000000 R15: ffff888008ccd750\n[  114.492397] FS:  00007fdc8a627e40(0000) GS:ffff888058200000(0000) knlGS:0000000000000000\n[  114.492797] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  114.493150] CR2: 0000000000000008 CR3: 00000000013ba000 CR4: 00000000000006f0\n[  114.493671] Call Trace:\n[  114.493890]  <TASK>\n[  114.494075]  __d_instantiate+0x24/0x1c0\n[  114.494505]  d_instantiate.part.0+0x35/0x50\n[  114.494754]  d_make_root+0x53/0x80\n[  114.494998]  ntfs_fill_super+0x1232/0x1b50\n[  114.495260]  ? put_ntfs+0x1d0/0x1d0\n[  114.495499]  ? vsprintf+0x20/0x20\n[  114.495723]  ? set_blocksize+0x95/0x150\n[  114.495964]  get_tree_bdev+0x232/0x370\n[  114.496272]  ? put_ntfs+0x1d0/0x1d0\n[  114.496502]  ntfs_fs_get_tree+0x15/0x20\n[  114.496859]  vfs_get_tree+0x4c/0x130\n[  114.497099]  path_mount+0x654/0xfe0\n[  114.497507]  ? putname+0x80/0xa0\n[  114.497933]  ? finish_automount+0x2e0/0x2e0\n[  114.498362]  ? putname+0x80/0xa0\n[  114.498571]  ? kmem_cache_free+0x1c4/0x440\n[  114.498819]  ? putname+0x80/0xa0\n[  114.499069]  do_mount+0xd6/0xf0\n[  114.499343]  ? path_mount+0xfe0/0xfe0\n[  114.499683]  ? __kasan_check_write+0x14/0x20\n[  114.500133]  __x64_sys_mount+0xca/0x110\n[  114.500592]  do_syscall_64+0x3b/0x90\n[  114.500930]  entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[  114.501294] RIP: 0033:0x7fdc898e948a\n[  114.501542] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\n[  114.502716] RSP: 002b:00007ffd793e58f8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5\n[  114.503175] RAX: ffffffffffffffda RBX: 0000564b2228f060 RCX: 00007fdc898e948a\n[  114.503588] RDX: 0000564b2228f260 RSI: 0000564b2228f2e0 RDI: 0000564b22297ce0\n[  114.504925] RBP: 0000000000000000 R08: 0000564b2228f280 R09: 0000000000000020\n[  114.505484] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564b22297ce0\n[  114.505823] R13: 0000564b2228f260 R14: 0000000000000000 R15: 00000000ffffffff\n[  114.506562]  </TASK>\n[  114.506887] Modules linked in:\n[  114.507648] CR2: 0000000000000008\n[  114.508884] ---[ end trace 0000000000000000 ]---\n[  114.509675] RIP: 0010:d_flags_for_inode+0xe0/0x110\n[  114.510140] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241\n[  114.511762] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296\n[  114.512401] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea\n[  114.51\n---truncated---"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ntfs3/super.c"],"versions":[{"version":"82cae269cfa953032fbb8980a7d554d60fb00b17","lessThan":"f62506f5e45afbb01c84c3f28a2878b320a0b0f7","status":"affected","versionType":"git"},{"version":"82cae269cfa953032fbb8980a7d554d60fb00b17","lessThan":"9f24743ddcdd3683b0a6b16e1439ad091dc3489b","status":"affected","versionType":"git"},{"version":"82cae269cfa953032fbb8980a7d554d60fb00b17","lessThan":"a7b23037b38b577d9a4372e0c6b7c9fe808070c1","status":"affected","versionType":"git"},{"version":"82cae269cfa953032fbb8980a7d554d60fb00b17","lessThan":"c1ca8ef0262b25493631ecbd9cb8c9893e1481a1","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ntfs3/super.c"],"versions":[{"version":"5.15","status":"affected"},{"version":"0","lessThan":"5.15","status":"unaffected","versionType":"semver"},{"version":"5.15.87","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.17","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1.3","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"5.15.87"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.0.17"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.1.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/f62506f5e45afbb01c84c3f28a2878b320a0b0f7"},{"url":"https://git.kernel.org/stable/c/9f24743ddcdd3683b0a6b16e1439ad091dc3489b"},{"url":"https://git.kernel.org/stable/c/a7b23037b38b577d9a4372e0c6b7c9fe808070c1"},{"url":"https://git.kernel.org/stable/c/c1ca8ef0262b25493631ecbd9cb8c9893e1481a1"}],"title":"fs/ntfs3: Add null pointer check for inode operations","x_generator":{"engine":"bippy-1.2.0"}}}}