CVE-2022-50756

Source
https://cve.org/CVERecord?id=CVE-2022-50756
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50756.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50756
Downstream
Related
Published
2025-12-24T13:05:49.635Z
Modified
2026-03-12T03:26:52.071881Z
Summary
nvme-pci: fix mempool alloc size
Details

In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: fix mempool alloc size

Convert the max size to bytes to match the units of the divisor that calculates the worst-case number of PRP entries.

The result is used to determine how many PRP Lists are required. The code was previously rounding this to 1 list, but we can require 2 in the worst case. In that scenario, the driver would corrupt memory beyond the size provided by the mempool.

While unlikely to occur (you'd need a 4MB in exactly 127 phys segments on a queue that doesn't support SGLs), this memory corruption has been observed by kfence.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50756.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
943e942e6266f22babee5efeb00f8f672fbff5bd
Fixed
dfb6d54893d544151e7f480bc44cfe7823f5ad23
Fixed
9141144b37f30e3e7fa024bcfa0a13011e546ba9
Fixed
e1777b4286e526c58b4ee699344b0ad85aaf83a0
Fixed
b1814724e0d7162bdf4799f2d565381bc2251c63
Fixed
c89a529e823d51dd23c7ec0c047c7a454a428541

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50756.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.18.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.87
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.17
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50756.json"