We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50131

HID: mcp2221: prevent a buffer overflow in mcp_smbus_write()



Description

In the Linux kernel, the following vulnerability has been resolved: HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() Smatch Warning: drivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy() '&mcp->txbuf[5]' too small (59 vs 255) drivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy() 'buf' too small (34 vs 255) The 'len' variable can take a value between 0-255 as it can come from data->block[0] and it is user data. So add an bound check to prevent a buffer overflow in memcpy().

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

67a95c21463d066060b0f66d65a75d45bb386ffb before 66c8e816f2f2ca4a61b406503bd10bad1b35f72f
affected

67a95c21463d066060b0f66d65a75d45bb386ffb before 91443c669d280937968f0aa4edefa741cfe35314
affected

67a95c21463d066060b0f66d65a75d45bb386ffb before 6402116a7b5ec80fa40fd145a80c813019cd555f
affected

67a95c21463d066060b0f66d65a75d45bb386ffb before 3c0f8a59f2cc8841ee6653399a77f4f3e6e9a270
affected

67a95c21463d066060b0f66d65a75d45bb386ffb before 62ac2473553a00229e67bdf3cb023b62cf7f5a9a
affected

Default status
affected

5.7
affected

Any version before 5.7
unaffected

5.10.137
unaffected

5.15.61
unaffected

5.18.18
unaffected

5.19.2
unaffected

6.0
unaffected

References

git.kernel.org/...c/66c8e816f2f2ca4a61b406503bd10bad1b35f72f

git.kernel.org/...c/91443c669d280937968f0aa4edefa741cfe35314

git.kernel.org/...c/6402116a7b5ec80fa40fd145a80c813019cd555f

git.kernel.org/...c/3c0f8a59f2cc8841ee6653399a77f4f3e6e9a270

git.kernel.org/...c/62ac2473553a00229e67bdf3cb023b62cf7f5a9a

cve.org (CVE-2022-50131)

nvd.nist.gov (CVE-2022-50131)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50131

Support options

Helpdesk Chat, Email, Knowledgebase