CVE-2022-50623Out-of-bounds Write in Linux

6 documents5 sources
Severity
N/A
No vector
EPSS
0.0%
top 89.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

In the Linux kernel, the following vulnerability has been resolved: fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() The "hdr.count * sizeof(s32)" multiplication can overflow on 32 bit systems leading to memory corruption. Use array_size() to fix that.

Affected Packages4 packages

Linuxlinux/linux_kernel5.9.05.10.150+3
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linux322b598be4d9b9090cda560c4caab78704615ab4f59861946fa51bcc1f305809e4ebc1013b0ee61c+5
debiandebian/linux< linux 6.0.3-1 (bookworm)

🔴Vulnerability Details

3
OSV
fpga: prevent integer overflow in dfl_feature_ioctl_set_irq()2025-12-08
GHSA
GHSA-4823-3f87-824g: In the Linux kernel, the following vulnerability has been resolved: fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() The "hdr2025-12-08
OSV
CVE-2022-50623: In the Linux kernel, the following vulnerability has been resolved: fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() The "hdr2025-12-08

📋Vendor Advisories

2
Red Hat
kernel: fpga: prevent integer overflow in dfl_feature_ioctl_set_irq()2025-12-08
Debian
CVE-2022-50623: linux - In the Linux kernel, the following vulnerability has been resolved: fpga: preve...2022