CVE-2022-50540Comparison Using Wrong Factors in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 98.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7

Description

In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom-adm: fix wrong sizeof config in slave_config Fix broken slave_config function that uncorrectly compare the peripheral_size with the size of the config pointer instead of the size of the config struct. This cause the crci value to be ignored and cause a kernel panic on any slave that use adm driver. To fix this, compare to the size of the struct and NOT the size of the pointer.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.175.19.17+1
Debianlinux/linux_kernel< 6.0.3-1+2
CVEListV5linux/linux03de6b273805b3c552ff158f8688555937375926f1dd45a6585a1689e1e8906b3f9e302b9d40c715+3
debiandebian/linux< linux 6.0.3-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2022-50540: In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom-adm: fix wrong sizeof config in slave_config Fix broken slave_conf2025-10-07
GHSA
GHSA-ffvc-9m8c-74cw: In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom-adm: fix wrong sizeof config in slave_config Fix broken slave_co2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: dmaengine: qcom-adm: fix wrong sizeof config in slave_config2025-10-07
Debian
CVE-2022-50540: linux - In the Linux kernel, the following vulnerability has been resolved: dmaengine: ...2022