CVE-2022-50131

In the Linux kernel, the following vulnerability has been resolved: HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() Smatch Warning: drivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy() '&mcp->txbuf[5]' too small (59 vs 255) drivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy() 'buf' too small (34 vs 255) The 'len' variable can take a value between 0-255 as it can come from data->block[0] and it is user data. So add an bound check to prevent a buffer overflow in memcpy().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Nov 2025, 18:09

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: mcp2221: evitar un desbordamiento de búfer en mcp_smbus_write() Advertencia de Smatch: drivers/hid/hid-mcp2221.c:388 Error de mcp_smbus_write(): __memcpy() '&mcp->txbuf[5]' demasiado pequeño (59 frente a 255) drivers/hid/hid-mcp2221.c:388 Error de mcp_smbus_write(): __memcpy() 'buf' demasiado pequeño (34 frente a 255) La variable 'len' puede tomar un valor entre 0 y 255, ya que puede provenir de data->block[0] y son datos de usuario. Por lo tanto, agregue una comprobación de límite para evitar un desbordamiento de búfer en memcpy().
CWE CWE-787
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/3c0f8a59f2cc8841ee6653399a77f4f3e6e9a270 - () https://git.kernel.org/stable/c/3c0f8a59f2cc8841ee6653399a77f4f3e6e9a270 - Patch
References () https://git.kernel.org/stable/c/62ac2473553a00229e67bdf3cb023b62cf7f5a9a - () https://git.kernel.org/stable/c/62ac2473553a00229e67bdf3cb023b62cf7f5a9a - Patch
References () https://git.kernel.org/stable/c/6402116a7b5ec80fa40fd145a80c813019cd555f - () https://git.kernel.org/stable/c/6402116a7b5ec80fa40fd145a80c813019cd555f - Patch
References () https://git.kernel.org/stable/c/66c8e816f2f2ca4a61b406503bd10bad1b35f72f - () https://git.kernel.org/stable/c/66c8e816f2f2ca4a61b406503bd10bad1b35f72f - Patch
References () https://git.kernel.org/stable/c/91443c669d280937968f0aa4edefa741cfe35314 - () https://git.kernel.org/stable/c/91443c669d280937968f0aa4edefa741cfe35314 - Patch

18 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 11:15

Updated : 2025-11-18 18:09


NVD link : CVE-2022-50131

Mitre link : CVE-2022-50131

CVE.ORG link : CVE-2022-50131


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write