Home

Description

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix slab-out-of-bounds in r_page When PAGE_SIZE is 64K, if read_log_page is called by log_read_rst for the first time, the size of *buffer would be equal to DefaultLogPageSize(4K).But for *buffer operations like memcpy, if the memory area size(n) which being assigned to buffer is larger than 4K (log->page_size(64K) or bytes(64K-page_off)), it will cause an out of boundary error. Call trace: [...] kasan_report+0x44/0x130 check_memory_region+0xf8/0x1a0 memcpy+0xc8/0x100 ntfs_read_run_nb+0x20c/0x460 read_log_page+0xd0/0x1f4 log_read_rst+0x110/0x75c log_replay+0x1e8/0x4aa0 ntfs_loadlog_and_replay+0x290/0x2d0 ntfs_fill_super+0x508/0xec0 get_tree_bdev+0x1fc/0x34c [...] Fix this by setting variable r_page to NULL in log_read_rst.

PUBLISHED Reserved 2025-12-30 | Published 2025-12-30 | Updated 2026-01-02 | Assigner Linux

Product status

Default status
unaffected

b46acd6a6a627d876898e1c84d3f84902264b445 (git) before ed686e7a26dd19ae6b46bb662f735acfa88ff7bc
affected

b46acd6a6a627d876898e1c84d3f84902264b445 (git) before bf86a640a34947d92062996e1a75b9cd9d83dd19
affected

b46acd6a6a627d876898e1c84d3f84902264b445 (git) before 6d076293e5bffdf897ea5f975669206e09beed6a
affected

b46acd6a6a627d876898e1c84d3f84902264b445 (git) before ecfbd57cf9c5ca225184ae266ce44ae473792132
affected

Default status
affected

5.15
affected

Any version before 5.15
unaffected

5.15.87 (semver)
unaffected

6.0.17 (semver)
unaffected

6.1.3 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/ed686e7a26dd19ae6b46bb662f735acfa88ff7bc

git.kernel.org/...c/bf86a640a34947d92062996e1a75b9cd9d83dd19

git.kernel.org/...c/6d076293e5bffdf897ea5f975669206e09beed6a

git.kernel.org/...c/ecfbd57cf9c5ca225184ae266ce44ae473792132

cve.org (CVE-2022-50869)

nvd.nist.gov (CVE-2022-50869)

Download JSON