CVE-2022-49754
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
27/03/2025
Last modified:
01/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Bluetooth: Fix a buffer overflow in mgmt_mesh_add()<br />
<br />
Smatch Warning:<br />
net/bluetooth/mgmt_util.c:375 mgmt_mesh_add() error: __memcpy()<br />
&#39;mesh_tx->param&#39; too small (48 vs 50)<br />
<br />
Analysis:<br />
<br />
&#39;mesh_tx->param&#39; is array of size 48. This is the destination.<br />
u8 param[sizeof(struct mgmt_cp_mesh_send) + 29]; // 19 + 29 = 48.<br />
<br />
But in the caller &#39;mesh_send&#39; we reject only when len > 50.<br />
len > (MGMT_MESH_SEND_SIZE + 31) // 19 + 31 = 50.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1 (including) | 6.1.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



