CVE-2022-50763
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
24/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
crypto: marvell/octeontx - prevent integer overflows<br />
<br />
The "code_length" value comes from the firmware file. If your firmware<br />
is untrusted realistically there is probably very little you can do to<br />
protect yourself. Still we try to limit the damage as much as possible.<br />
Also Smatch marks any data read from the filesystem as untrusted and<br />
prints warnings if it not capped correctly.<br />
<br />
The "code_length * 2" can overflow. The round_up(ucode_size, 16) +<br />
sizeof() expression can overflow too. Prevent these overflows.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/12acfa1059ad69aa352ddb2bf23ba1b831aff15f
- https://git.kernel.org/stable/c/7bfa7d67735381715c98091194e81e7685f9b7db
- https://git.kernel.org/stable/c/8f5eee162e55175d9dac98b5e9b8da76449d2257
- https://git.kernel.org/stable/c/caca37cf6c749ff0303f68418cfe7b757a4e0697
- https://git.kernel.org/stable/c/e7ff7a46baafd38d7ed45604397e650d61f5db8d



