CVE-2022-50701 — Incorrect Calculation of Buffer Size in Linux
Severity
6.3MEDIUM
No vectorEPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host
SDIO may need addtional 511 bytes to align bus operation. If the tailroom
of this skb is not big enough, we would access invalid memory region.
For low level operation, increase skb size to keep valid memory access in
SDIO host.
Error message:
[69.951] BUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0xe9/0x1a0
[69.951] Read of size 64 at addr ffff88811c9cf000 by…
Affected Packages4 packages
▶CVEListV5linux/linux764dee47e2c1ed828c8a51cbf58f89b5e3ded11b — 8b5174a7f25d03df0ffa171ff86de383a89e8e89+3
🔴Vulnerability Details
3GHSA▶
GHSA-9vm9-fqq4-5wqv: In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host
SDIO may need ad↗2025-12-24
OSV▶
CVE-2022-50701: In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host SDIO may need addt↗2025-12-24