CVE-2022-50701

Source
https://cve.org/CVERecord?id=CVE-2022-50701
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50701.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50701
Downstream
Related
Published
2025-12-24T10:55:17.090Z
Modified
2026-01-30T00:37:27.117314Z
Summary
wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host

SDIO may need addtional 511 bytes to align bus operation. If the tailroom of this skb is not big enough, we would access invalid memory region. For low level operation, increase skb size to keep valid memory access in SDIO host.

Error message: [69.951] BUG: KASAN: slab-out-of-bounds in sgcopybuffer+0xe9/0x1a0 [69.951] Read of size 64 at addr ffff88811c9cf000 by task kworker/u16:7/451 [69.951] CPU: 4 PID: 451 Comm: kworker/u16:7 Tainted: G W OE 6.1.0-rc5 #1 [69.951] Workqueue: kvub300c vub300cmndworkthread [vub300] [69.951] Call Trace: [69.951] <TASK> [69.952] dumpstacklvl+0x49/0x63 [69.952] printreport+0x171/0x4a8 [69.952] kasanreport+0xb4/0x130 [69.952] kasancheckrange+0x149/0x1e0 [69.952] memcpy+0x24/0x70 [69.952] sgcopybuffer+0xe9/0x1a0 [69.952] sgcopytobuffer+0x12/0x20 [69.952] _commandwritedata.isra.0+0x23c/0xbf0 [vub300] [69.952] vub300cmndworkthread+0x17f3/0x58b0 [vub300] [69.952] processonework+0x7ee/0x1320 [69.952] workerthread+0x53c/0x1240 [69.952] kthread+0x2b8/0x370 [69.952] retfrom_fork+0x1f/0x30 [69.952] </TASK>

[69.952] Allocated by task 854: [69.952] kasansavestack+0x26/0x50 [69.952] kasansettrack+0x25/0x30 [69.952] kasansaveallocinfo+0x1b/0x30 [69.952] _kasankmalloc+0x87/0xa0 [69.952] _kmallocnodetrackcaller+0x63/0x150 [69.952] kmallocreserve+0x31/0xd0 [69.952] _allocskb+0xfc/0x2b0 [69.952] _mt76mcumsgalloc+0xbf/0x230 [mt76] [69.952] mt76mcusendandgetmsg+0xab/0x110 [mt76] [69.952] _mt76mcusendfirmware.cold+0x94/0x15d [mt76] [69.952] mt76connacmcusendramfirmware+0x415/0x54d [mt76connaclib] [69.952] mt76connac2loadram.cold+0x118/0x4bc [mt76connaclib] [69.952] mt7921runfirmware.cold+0x2e9/0x405 [mt7921common] [69.952] mt7921smcuinit+0x45/0x80 [mt7921s] [69.953] mt7921initwork+0xe1/0x2a0 [mt7921common] [69.953] processonework+0x7ee/0x1320 [69.953] workerthread+0x53c/0x1240 [69.953] kthread+0x2b8/0x370 [69.953] retfromfork+0x1f/0x30 [69.953] The buggy address belongs to the object at ffff88811c9ce800 which belongs to the cache kmalloc-2k of size 2048 [69.953] The buggy address is located 0 bytes to the right of 2048-byte region [ffff88811c9ce800, ffff88811c9cf000)

[69.953] Memory state around the buggy address: [69.953] ffff88811c9cef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [69.953] ffff88811c9cef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [69.953] >ffff88811c9cf000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [69.953] ^ [69.953] ffff88811c9cf080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [69.953] ffff88811c9cf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50701.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
764dee47e2c1ed828c8a51cbf58f89b5e3ded11b
Fixed
8b5174a7f25d03df0ffa171ff86de383a89e8e89
Fixed
0b358e36433d2c46a65488a146bf8b4623fc5bbb
Fixed
aec4cf2ea0797e28f18f8dbe01943a56d987fe56

Affected versions

v5.*
v5.15
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v6.*
v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.2
v6.1.3
v6.1.4
v6.1.5
v6.1.6
v6.1.7
v6.1.8
v6.1.9
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.2.1
v6.2.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50701.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.16
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50701.json"