VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2022-50763

CVE-2022-50763

Description

In the Linux kernel, the following vulnerability has been resolved:

crypto: marvell/octeontx - prevent integer overflows

The "code_length" value comes from the firmware file. If your firmware is untrusted realistically there is probably very little you can do to protect yourself. Still we try to limit the damage as much as possible. Also Smatch marks any data read from the filesystem as untrusted and prints warnings if it not capped correctly.

The "code_length * 2" can overflow. The round_up(ucode_size, 16) + sizeof() expression can overflow too. Prevent these overflows.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Integer overflow in Marvell OcteonTX crypto driver allows out-of-bounds arbitrary code execution via crafted firmware.

Vulnerability

In the Linux kernel's Marvell OcteonTX crypto driver, integer overflows can integer overflows occur when processing firmware files. The code_length value, which originates from the firmware file, is used in calculations such as code_length * 2 and round_up(ucode_size, 16) + sizeof(...). Without proper bounds checking, these operations can overflow, leading to undersized buffer allocations and potential memory corruption [1][2].

Exploitation

An attacker with the ability to supply a crafted firmware file to the system can trigger these overflows. The firmware file is typically loaded during driver initialization, and if the attacker can control the firmware (e.g., through a malicious update or by having local access), they can cause the driver to allocate insufficient memory. This can lead to out-of-bounds writes when the firmware data is processed [1][2].

Impact

Successful exploitation could allow an attacker to corrupt kernel memory, potentially leading to arbitrary code execution in the kernel context in the kernel. This would give the attacker full control over the system, including the ability to install persistent malware, exfiltrate data, or cause denial of service [1][2].

Mitigation

The vulnerability has been patched in the Linux kernel. The fix adds proper integer overflow checks before performing the arithmetic operations, ensuring that buffer sizes are correctly calculated. Users should update their kernel to a version containing the commit that addresses this issue [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

5

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.