CVE-2022-49112

In the Linux kernel, the following vulnerability has been resolved: mt76: fix monitor mode crash with sdio driver mt7921s driver may receive frames with fragment buffers. If there is a CTS packet received in monitor mode, the payload is 10 bytes only and need 6 bytes header padding after RXD buffer. However, only RXD in the first linear buffer, if we pull buffer size RXD-size+6 bytes with skb_pull(), that would trigger "BUG_ON(skb->len < skb->data_len)" in __skb_pull(). To avoid the nonlinear buffer issue, enlarge the RXD size from 128 to 256 to make sure all MCU operation in linear buffer. [ 52.007562] kernel BUG at include/linux/skbuff.h:2313! [ 52.007578] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP [ 52.007987] pc : skb_pull+0x48/0x4c [ 52.008015] lr : mt7921_queue_rx_skb+0x494/0x890 [mt7921_common] [ 52.008361] Call trace: [ 52.008377] skb_pull+0x48/0x4c [ 52.008400] mt76s_net_worker+0x134/0x1b0 [mt76_sdio 35339a92c6eb7d4bbcc806a1d22f56365565135c] [ 52.008431] __mt76_worker_fn+0xe8/0x170 [mt76 ef716597d11a77150bc07e3fdd68eeb0f9b56917] [ 52.008449] kthread+0x148/0x3ac [ 52.008466] ret_from_fork+0x10/0x30
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Oct 2025, 20:00

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/123bc712b1de0805f9d683687e17b1ec2aba0b68 - () https://git.kernel.org/stable/c/123bc712b1de0805f9d683687e17b1ec2aba0b68 - Patch
References () https://git.kernel.org/stable/c/13946d5a68efd11dd6af2f6ef4c908f6b00158a5 - () https://git.kernel.org/stable/c/13946d5a68efd11dd6af2f6ef4c908f6b00158a5 - Patch
References () https://git.kernel.org/stable/c/95e2af01669c7a3cb7a933cefa06361f9db15059 - () https://git.kernel.org/stable/c/95e2af01669c7a3cb7a933cefa06361f9db15059 - Patch
References () https://git.kernel.org/stable/c/c37b4cab3d97ef64b206fca4d9daabd9aff7356e - () https://git.kernel.org/stable/c/c37b4cab3d97ef64b206fca4d9daabd9aff7356e - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mt76: se corrige el fallo del modo de monitor con el controlador sdio. El controlador mt7921s puede recibir tramas con búferes de fragmentos. Si se recibe un paquete CTS en el modo de monitor, la carga útil es de solo 10 bytes y se necesitan 6 bytes de relleno de encabezado después del búfer RXD. Sin embargo, solo RXD en el primer búfer lineal, si extraemos el tamaño del búfer RXD-size+6 bytes con skb_pull(), eso activaría "BUG_ON(skb-&gt;len &lt; skb-&gt;data_len)" en __skb_pull(). Para evitar el problema del búfer no lineal, amplíe el tamaño de RXD de 128 a 256 para asegurarse de que todas las operaciones de MCU se realicen en el búfer lineal. [ 52.007562] ¡ERROR del kernel en include/linux/skbuff.h:2313! [ 52.007578] Error interno: Vaya - ERROR: 0 [#1] PREEMPT SMP [ 52.007987] pc : skb_pull+0x48/0x4c [ 52.008015] lr : mt7921_queue_rx_skb+0x494/0x890 [mt7921_common] [ 52.008361] Rastreo de llamadas: [ 52.008377] skb_pull+0x48/0x4c [ 52.008400] mt76s_net_worker+0x134/0x1b0 [mt76_sdio 35339a92c6eb7d4bbcc806a1d22f56365565135c] [ 52.008431] __mt76_worker_fn+0xe8/0x170 [mt76 ef716597d11a77150bc07e3fdd68eeb0f9b56917] [ 52.008449] kthread+0x148/0x3ac [ 52.008466] ret_from_fork+0x10/0x30

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-10-14 20:00


NVD link : CVE-2022-49112

Mitre link : CVE-2022-49112

CVE.ORG link : CVE-2022-49112


JSON object : View

Products Affected

linux

  • linux_kernel