CVE-2022-49754

HIGH

Linux Kernel < 6.1.9 - Buffer Overflow

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix a buffer overflow in mgmt_mesh_add() Smatch Warning: net/bluetooth/mgmt_util.c:375 mgmt_mesh_add() error: __memcpy() 'mesh_tx->param' too small (48 vs 50) Analysis: 'mesh_tx->param' is array of size 48. This is the destination. u8 param[sizeof(struct mgmt_cp_mesh_send) + 29]; // 19 + 29 = 48. But in the caller 'mesh_send' we reject only when len > 50. len > (MGMT_MESH_SEND_SIZE + 31) // 19 + 31 = 50.

Scores

CVSS v3 7.8
EPSS 0.0020
EPSS Percentile 41.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-120
Status published
Products (3)
linux/Kernel 6.1.0 - 6.1.9linux
linux/linux_kernel 6.2 rc1 (4 CPE variants)
linux/linux_kernel 6.1 - 6.1.9
Published Mar 27, 2025
Tracked Since Feb 18, 2026