Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-49754


In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix a buffer overflow in mgmt_mesh_add() Smatch Warning: net/bluetooth/mgmt_util.c:375 mgmt_mesh_add() error: __memcpy() 'mesh_tx->param' too small (48 vs 50) Analysis: 'mesh_tx->param' is array of size 48. This is the destination. u8 param[sizeof(struct mgmt_cp_mesh_send) + 29]; // 19 + 29 = 48. But in the caller 'mesh_send' we reject only when len > 50. len > (MGMT_MESH_SEND_SIZE + 31) // 19 + 31 = 50.


Published

2025-03-27T17:15:40.423

Last Modified

2025-10-01T20:17:10.407

Status

Modified

Source

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Severity

CVSSv3.1: 7.8 (HIGH)

Weaknesses
  • Type: Primary
    CWE-120
  • Type: Secondary
    CWE-120

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 6.1.9 Yes
Operating System linux linux_kernel 6.2 Yes
Operating System linux linux_kernel 6.2 Yes
Operating System linux linux_kernel 6.2 Yes
Operating System linux linux_kernel 6.2 Yes

References