CVE-2022-50407

In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - increase the memory of local variables Increase the buffer to prevent stack overflow by fuzz test. The maximum length of the qos configuration buffer is 256 bytes. Currently, the value of the 'val buffer' is only 32 bytes. The sscanf does not check the dest memory length. So the 'val buffer' may stack overflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

11 Dec 2025, 15:01

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CWE CWE-674
References () https://git.kernel.org/stable/c/34c4f8ad45b4ea814c7ecc3f23a2d292959d5a52 - () https://git.kernel.org/stable/c/34c4f8ad45b4ea814c7ecc3f23a2d292959d5a52 - Patch
References () https://git.kernel.org/stable/c/3efe90af4c0c46c58dba1b306de142827153d9c0 - () https://git.kernel.org/stable/c/3efe90af4c0c46c58dba1b306de142827153d9c0 - Patch
References () https://git.kernel.org/stable/c/fc521abb6ee4b8f06fdfc52646140dab6a2ed334 - () https://git.kernel.org/stable/c/fc521abb6ee4b8f06fdfc52646140dab6a2ed334 - Patch

18 Sep 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-18 16:15

Updated : 2025-12-11 15:01


NVD link : CVE-2022-50407

Mitre link : CVE-2022-50407

CVE.ORG link : CVE-2022-50407


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-674

Uncontrolled Recursion