CVE-2022-49112

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
14/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mt76: fix monitor mode crash with sdio driver<br /> <br /> mt7921s driver may receive frames with fragment buffers. If there is a<br /> CTS packet received in monitor mode, the payload is 10 bytes only and<br /> need 6 bytes header padding after RXD buffer. However, only RXD in the<br /> first linear buffer, if we pull buffer size RXD-size+6 bytes with<br /> skb_pull(), that would trigger "BUG_ON(skb-&gt;len data_len)" in<br /> __skb_pull().<br /> <br /> To avoid the nonlinear buffer issue, enlarge the RXD size from 128 to<br /> 256 to make sure all MCU operation in linear buffer.<br /> <br /> [ 52.007562] kernel BUG at include/linux/skbuff.h:2313!<br /> [ 52.007578] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP<br /> [ 52.007987] pc : skb_pull+0x48/0x4c<br /> [ 52.008015] lr : mt7921_queue_rx_skb+0x494/0x890 [mt7921_common]<br /> [ 52.008361] Call trace:<br /> [ 52.008377] skb_pull+0x48/0x4c<br /> [ 52.008400] mt76s_net_worker+0x134/0x1b0 [mt76_sdio 35339a92c6eb7d4bbcc806a1d22f56365565135c]<br /> [ 52.008431] __mt76_worker_fn+0xe8/0x170 [mt76 ef716597d11a77150bc07e3fdd68eeb0f9b56917]<br /> [ 52.008449] kthread+0x148/0x3ac<br /> [ 52.008466] ret_from_fork+0x10/0x30

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.16 (including) 5.15.34 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.16.20 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.17 (including) 5.17.3 (excluding)