{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50040","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-06-18T10:57:27.398Z","datePublished":"2025-06-18T11:01:41.420Z","dateUpdated":"2026-05-11T19:11:40.894Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:11:40.894Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: sja1105: fix buffer overflow in sja1105_setup_devlink_regions()\n\nIf an error occurs in dsa_devlink_region_create(), then 'priv->regions'\narray will be accessed by negative index '-1'.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/dsa/sja1105/sja1105_devlink.c"],"versions":[{"version":"bf425b82059e0b0752c0026353c1902112200837","lessThan":"7983e1e44cb322eba6af84160b6d18df80603fb8","status":"affected","versionType":"git"},{"version":"bf425b82059e0b0752c0026353c1902112200837","lessThan":"e84c6321f3578c38cb3c24258db91a92672b17a8","status":"affected","versionType":"git"},{"version":"bf425b82059e0b0752c0026353c1902112200837","lessThan":"79f86b862416126a2e826cb74224180d6625a32f","status":"affected","versionType":"git"},{"version":"bf425b82059e0b0752c0026353c1902112200837","lessThan":"fd8e899cdb5ecaf8e8ee73854a99e10807eef1de","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/dsa/sja1105/sja1105_devlink.c"],"versions":[{"version":"5.10","status":"affected"},{"version":"0","lessThan":"5.10","status":"unaffected","versionType":"semver"},{"version":"5.10.138","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.63","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"5.19.4","lessThanOrEqual":"5.19.*","status":"unaffected","versionType":"semver"},{"version":"6.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"5.10.138"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"5.15.63"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"5.19.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.0"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/7983e1e44cb322eba6af84160b6d18df80603fb8"},{"url":"https://git.kernel.org/stable/c/e84c6321f3578c38cb3c24258db91a92672b17a8"},{"url":"https://git.kernel.org/stable/c/79f86b862416126a2e826cb74224180d6625a32f"},{"url":"https://git.kernel.org/stable/c/fd8e899cdb5ecaf8e8ee73854a99e10807eef1de"}],"title":"net: dsa: sja1105: fix buffer overflow in sja1105_setup_devlink_regions()","x_generator":{"engine":"bippy-1.2.0"}}}}