CVE-2022-50701
Slab-Out-Of-Bounds in Linux mt76 mt7921s SDIO Host
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mt76 | mt7921s | * |
| mt76 | mt7921_common | * |
| mt76 | mt76_connac_lib | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a slab-out-of-bounds memory access issue in the Linux kernel's mt76 WiFi driver, specifically affecting the mt7921s SDIO host. The problem occurs because the SDIO bus operation may require an additional 511 bytes for alignment, and if the tailroom of the socket buffer (skb) is insufficient, the driver accesses invalid memory regions. This can lead to reading or writing beyond the allocated memory buffer, causing potential system instability or crashes.
How can this vulnerability impact me? :
The vulnerability can cause invalid memory access in the kernel, which may lead to system crashes, instability, or unexpected behavior in devices using the affected mt76 WiFi drivers. This could potentially be exploited to disrupt normal operation or cause denial of service conditions on affected systems.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability can be done by monitoring kernel logs for specific error messages related to slab-out-of-bounds access in the mt76 driver, especially messages containing 'BUG: KASAN: slab-out-of-bounds in sg_copy_buffer' and related stack traces. You can use the command 'dmesg | grep -i kasan' or 'journalctl -k | grep -i kasan' to check for these errors in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the mt76 mt7921s driver has been patched to fix the slab-out-of-bounds access issue. Until the update is applied, avoid using affected hardware or disable the mt7921s driver if possible to prevent triggering the vulnerability.