{"id":"CVE-2022-50581","summary":"hfs: fix OOB Read in __hfs_brec_find","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: fix OOB Read in __hfs_brec_find\n\nSyzbot reported a OOB read bug:\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in hfs_strcmp+0x117/0x190\nfs/hfs/string.c:84\nRead of size 1 at addr ffff88807eb62c4e by task kworker/u4:1/11\nCPU: 1 PID: 11 Comm: kworker/u4:1 Not tainted\n6.1.0-rc6-syzkaller-00308-g644e9524388a #0\nWorkqueue: writeback wb_workfn (flush-7:0)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106\n print_address_description+0x74/0x340 mm/kasan/report.c:284\n print_report+0x107/0x1f0 mm/kasan/report.c:395\n kasan_report+0xcd/0x100 mm/kasan/report.c:495\n hfs_strcmp+0x117/0x190 fs/hfs/string.c:84\n __hfs_brec_find+0x213/0x5c0 fs/hfs/bfind.c:75\n hfs_brec_find+0x276/0x520 fs/hfs/bfind.c:138\n hfs_write_inode+0x34c/0xb40 fs/hfs/inode.c:462\n write_inode fs/fs-writeback.c:1440 [inline]\n\nIf the input inode of hfs_write_inode() is incorrect:\nstruct inode\n  struct hfs_inode_info\n    struct hfs_cat_key\n      struct hfs_name\n        u8 len # len is greater than HFS_NAMELEN(31) which is the\nmaximum length of an HFS filename\n\nOOB read occurred:\nhfs_write_inode()\n  hfs_brec_find()\n    __hfs_brec_find()\n      hfs_cat_keycmp()\n        hfs_strcmp() # OOB read occurred due to len is too large\n\nFix this by adding a Check on len in hfs_write_inode() before calling\nhfs_brec_find().","modified":"2026-04-02T08:28:39.476470Z","published":"2025-10-22T13:23:33.421Z","related":["SUSE-SU-2025:4111-1","SUSE-SU-2025:4139-1","SUSE-SU-2025:4149-1","SUSE-SU-2025:4189-1","SUSE-SU-2025:4320-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50581.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2344f17c0a89c181ab1a9fef57fd8c3bddfd6e30"},{"type":"WEB","url":"https://git.kernel.org/stable/c/367296925c7625c3969d2a78d7a3e1dee161beb5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4fd3a11804c8877ff11fec59c5c53f1635331e3e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8c40f2dbae603ef0bd21e87c63f54ec59fd88256"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8d824e69d9f3fa3121b2dda25053bae71e2460d2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/90103ccb6e60aa4efe48993d23d6a528472f2233"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bfc9d8f27f89717431a6aecce42ae230b437433f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c886c10a6eddb99923b315f42bf63f448883ef9a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e9e692917c6e10a7066c7a6d092dcdc3d4e329f3"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50581.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50581"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2"},{"fixed":"8c40f2dbae603ef0bd21e87c63f54ec59fd88256"},{"fixed":"c886c10a6eddb99923b315f42bf63f448883ef9a"},{"fixed":"2344f17c0a89c181ab1a9fef57fd8c3bddfd6e30"},{"fixed":"90103ccb6e60aa4efe48993d23d6a528472f2233"},{"fixed":"4fd3a11804c8877ff11fec59c5c53f1635331e3e"},{"fixed":"367296925c7625c3969d2a78d7a3e1dee161beb5"},{"fixed":"e9e692917c6e10a7066c7a6d092dcdc3d4e329f3"},{"fixed":"bfc9d8f27f89717431a6aecce42ae230b437433f"},{"fixed":"8d824e69d9f3fa3121b2dda25053bae71e2460d2"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50581.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.12"},{"fixed":"4.9.337"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.10.0"},{"fixed":"4.14.303"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.270"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.229"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.163"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.86"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.1.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50581.json"}}],"schema_version":"1.7.5"}