CVE-2022-49754
27.03.2025, 17:15
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix a buffer overflow in mgmt_mesh_add() Smatch Warning: net/bluetooth/mgmt_util.c:375 mgmt_mesh_add() error: __memcpy() 'mesh_tx->param' too small (48 vs 50) Analysis: 'mesh_tx->param' is array of size 48. This is the destination. u8 param[sizeof(struct mgmt_cp_mesh_send) + 29]; // 19 + 29 = 48. But in the caller 'mesh_send' we reject only when len > 50. len > (MGMT_MESH_SEND_SIZE + 31) // 19 + 31 = 50.
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 6.1 ≤ 𝑥 < 6.1.9 |
linux | linux_kernel | 6.2:rc1 |
linux | linux_kernel | 6.2:rc2 |
linux | linux_kernel | 6.2:rc3 |
linux | linux_kernel | 6.2:rc4 |
𝑥
= Vulnerable software versions

Debian Releases
Vulnerability Media Exposure