CVE-2022-50131

Source
https://cve.org/CVERecord?id=CVE-2022-50131
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50131.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50131
Downstream
Related
Published
2025-06-18T11:02:56.796Z
Modified
2026-04-02T17:30:38.029272439Z
Summary
HID: mcp2221: prevent a buffer overflow in mcp_smbus_write()
Details

In the Linux kernel, the following vulnerability has been resolved:

HID: mcp2221: prevent a buffer overflow in mcpsmbuswrite()

Smatch Warning: drivers/hid/hid-mcp2221.c:388 mcpsmbuswrite() error: __memcpy() '&mcp->txbuf[5]' too small (59 vs 255) drivers/hid/hid-mcp2221.c:388 mcpsmbuswrite() error: __memcpy() 'buf' too small (34 vs 255)

The 'len' variable can take a value between 0-255 as it can come from data->block[0] and it is user data. So add an bound check to prevent a buffer overflow in memcpy().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50131.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
67a95c21463d066060b0f66d65a75d45bb386ffb
Fixed
66c8e816f2f2ca4a61b406503bd10bad1b35f72f
Fixed
91443c669d280937968f0aa4edefa741cfe35314
Fixed
6402116a7b5ec80fa40fd145a80c813019cd555f
Fixed
3c0f8a59f2cc8841ee6653399a77f4f3e6e9a270
Fixed
62ac2473553a00229e67bdf3cb023b62cf7f5a9a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50131.json"