CVE-2022-49368

Source
https://cve.org/CVERecord?id=CVE-2022-49368
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49368.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49368
Downstream
Related
Published
2025-02-26T02:11:12.193Z
Modified
2026-03-12T03:25:03.651536Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
net: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry()
Details

In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: mtkethsoc: out of bounds read in mtkhwlrogetfdirentry()

The "fsp->location" variable comes from user via ethtoolgetrxnfc(). Check that it is valid to prevent an out of bounds read.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49368.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd
Fixed
b4f0e57ea0d867aacffad7999527e48bd4ea9293
Fixed
5ba81f82607ead85fe36f50869fc4f5661359ab8
Fixed
657e7174603f0aab2cdedc64ac81edffd2a87afe
Fixed
2bd1faedb74dc2a2be3972abcd4239b75a3e7b00
Fixed
71ae30662ec610b92644d13f79c78f76f17873b3
Fixed
b24ca1cf846273361d5bd73a35de95a486a54b6d
Fixed
4cde554c70d7397cfa2e4116bacb4accdfb6fd48
Fixed
0b238f75b65ed4462ef4cdfa718cac0ac7fce3b8
Fixed
e7e7104e2d5ddf3806a28695670f21bef471f1e1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49368.json"