Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - increase the memory of local variables Increase the buffer to prevent stack overflow by fuzz test. The maximum length of the qos configuration buffer is 256 bytes. Currently, the value of the 'val buffer' is only 32 bytes. The sscanf does not check the dest memory length. So the 'val buffer' may stack overflow.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.4, < 6.0.16 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/34c4f8ad45b4ea814c7ecc3f23a2d292959d5a52Patch
- https://git.kernel.org/stable/c/3efe90af4c0c46c58dba1b306de142827153d9c0Patch
- https://git.kernel.org/stable/c/fc521abb6ee4b8f06fdfc52646140dab6a2ed334Patch
FAQ
What is CVE-2022-50407?
CVE-2022-50407 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - increase the memory of local variables Increase the buffer to prevent stack overflow by fuzz test. The maxi...
How severe is CVE-2022-50407?
CVE-2022-50407 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-50407?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.