{"id":"CVE-2022-50763","summary":"crypto: marvell/octeontx - prevent integer overflows","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: marvell/octeontx - prevent integer overflows\n\nThe \"code_length\" value comes from the firmware file.  If your firmware\nis untrusted realistically there is probably very little you can do to\nprotect yourself.  Still we try to limit the damage as much as possible.\nAlso Smatch marks any data read from the filesystem as untrusted and\nprints warnings if it not capped correctly.\n\nThe \"code_length * 2\" can overflow.  The round_up(ucode_size, 16) +\nsizeof() expression can overflow too.  Prevent these overflows.","modified":"2026-03-20T11:47:36.439949Z","published":"2025-12-24T13:05:54.704Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50763.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/12acfa1059ad69aa352ddb2bf23ba1b831aff15f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7bfa7d67735381715c98091194e81e7685f9b7db"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8f5eee162e55175d9dac98b5e9b8da76449d2257"},{"type":"WEB","url":"https://git.kernel.org/stable/c/caca37cf6c749ff0303f68418cfe7b757a4e0697"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e7ff7a46baafd38d7ed45604397e650d61f5db8d"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50763.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50763"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d9110b0b01ff1cd02751cd5c2c94e938a8906083"},{"fixed":"7bfa7d67735381715c98091194e81e7685f9b7db"},{"fixed":"12acfa1059ad69aa352ddb2bf23ba1b831aff15f"},{"fixed":"8f5eee162e55175d9dac98b5e9b8da76449d2257"},{"fixed":"e7ff7a46baafd38d7ed45604397e650d61f5db8d"},{"fixed":"caca37cf6c749ff0303f68418cfe7b757a4e0697"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50763.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.7.0"},{"fixed":"5.10.150"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.75"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"5.19.17"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.20.0"},{"fixed":"6.0.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50763.json"}}],"schema_version":"1.7.5"}