CVE-2022-50497

EUVD-2025-32329
In the Linux kernel, the following vulnerability has been resolved:

binfmt_misc: fix shift-out-of-bounds in check_special_flags

UBSAN reported a shift-out-of-bounds warning:

 left shift of 1 by 31 places cannot be represented in type 'int'
 Call Trace:
  <TASK>
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x8d/0xcf lib/dump_stack.c:106
  ubsan_epilogue+0xa/0x44 lib/ubsan.c:151
  __ubsan_handle_shift_out_of_bounds+0x1e7/0x208 lib/ubsan.c:322
  check_special_flags fs/binfmt_misc.c:241 [inline]
  create_entry fs/binfmt_misc.c:456 [inline]
  bm_register_write+0x9d3/0xa20 fs/binfmt_misc.c:654
  vfs_write+0x11e/0x580 fs/read_write.c:582
  ksys_write+0xcf/0x120 fs/read_write.c:637
  do_syscall_x64 arch/x86/entry/common.c:50 [inline]
  do_syscall_64+0x34/0x80 arch/x86/entry/common.c:80
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
 RIP: 0033:0x4194e1

Since the type of Node's flags is unsigned long, we should define these
macros with same type too.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.1 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 2%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
2.6.12.1 ≤
𝑥
< 4.9.337
linuxlinux_kernel
4.10 ≤
𝑥
< 4.14.303
linuxlinux_kernel
4.15 ≤
𝑥
< 4.19.270
linuxlinux_kernel
4.20 ≤
𝑥
< 5.4.229
linuxlinux_kernel
5.5 ≤
𝑥
< 5.10.163
linuxlinux_kernel
5.11 ≤
𝑥
< 5.15.86
linuxlinux_kernel
5.16 ≤
𝑥
< 6.0.16
linuxlinux_kernel
6.1 ≤
𝑥
< 6.1.2
linuxlinux_kernel
2.6.12
linuxlinux_kernel
2.6.12:rc2
linuxlinux_kernel
2.6.12:rc3
linuxlinux_kernel
2.6.12:rc4
linuxlinux_kernel
2.6.12:rc5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bookworm
6.1.148-1
fixed
bookworm (security)
6.1.153-1
fixed
bullseye
5.10.223-1
fixed
bullseye (security)
5.10.237-1
fixed
forky
6.16.9-1
fixed
sid
6.16.9-1
fixed
trixie
6.12.43-1
fixed
trixie (security)
6.12.48-1
fixed
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
cluster-md-kmp-default
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
dlm-kmp-default
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
gfs2-kmp-default
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-64kb
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-default
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-default-base
suse enterprise server 15 SP4
5.14.21-150400.24.184.1.150400.24.94.2
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1.150500.6.61.1
fixed
kernel-docs
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-macros
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-obs-build
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-source
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-syms
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
kernel-zfcpdump
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
ocfs2-kmp-default
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed
reiserfs-kmp-default
suse enterprise server 15 SP4
5.14.21-150400.24.184.1
fixed
suse enterprise server 15 SP5
5.14.21-150500.55.127.1
fixed