{"id":"CVE-2022-50330","summary":"crypto: cavium - prevent integer overflow loading firmware","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: cavium - prevent integer overflow loading firmware\n\nThe \"code_length\" value comes from the firmware file.  If your firmware\nis untrusted realistically there is probably very little you can do to\nprotect yourself.  Still we try to limit the damage as much as possible.\nAlso Smatch marks any data read from the filesystem as untrusted and\nprints warnings if it not capped correctly.\n\nThe \"ntohl(ucode-\u003ecode_length) * 2\" multiplication can have an\ninteger overflow.","modified":"2026-04-02T08:28:24.972998Z","published":"2025-09-15T14:49:33.015Z","related":["SUSE-SU-2025:03613-1","SUSE-SU-2025:03614-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03626-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3761-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50330.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/172c8a24fc8312cf6b88d3c88469653fdcb1c127"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2526d6bf27d15054bb0778b2f7bc6625fd934905"},{"type":"WEB","url":"https://git.kernel.org/stable/c/371fa5129af53a79f6dddc90fe5bb0825cbe72a4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3a720eb89026c5241b8c4abb33370dc6fb565eee"},{"type":"WEB","url":"https://git.kernel.org/stable/c/584561e94260268abe1c83e00d9c205565cb7bc5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/90e483e7f20c32287d2a9da967e122938f52737a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c4d4c2afd08dfb3cd1c880d1811ede2568e81a6d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e29fd7a6852376d2cfb95ad5d6d3eeff93f815e9"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50330.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50330"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"9e2c7d99941d000a36f68a3594cec27a1bbea274"},{"fixed":"c4d4c2afd08dfb3cd1c880d1811ede2568e81a6d"},{"fixed":"90e483e7f20c32287d2a9da967e122938f52737a"},{"fixed":"584561e94260268abe1c83e00d9c205565cb7bc5"},{"fixed":"3a720eb89026c5241b8c4abb33370dc6fb565eee"},{"fixed":"172c8a24fc8312cf6b88d3c88469653fdcb1c127"},{"fixed":"371fa5129af53a79f6dddc90fe5bb0825cbe72a4"},{"fixed":"e29fd7a6852376d2cfb95ad5d6d3eeff93f815e9"},{"fixed":"2526d6bf27d15054bb0778b2f7bc6625fd934905"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50330.json"}}],"schema_version":"1.7.5"}