CVE-2022-50625 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Linux
Severity
5.8MEDIUM
No vectorEPSS
0.1%
top 80.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 8
Description
In the Linux kernel, the following vulnerability has been resolved:
serial: amba-pl011: avoid SBSA UART accessing DMACR register
Chapter "B Generic UART" in "ARM Server Base System Architecture" [1]
documentation describes a generic UART interface. Such generic UART
does not support DMA. In current code, sbsa_uart_pops and
amba_pl011_pops share the same stop_rx operation, which will invoke
pl011_dma_rx_stop, leading to an access of the DMACR register. This
commit adds a using_rx_dma check in p…
Affected Packages4 packages
▶CVEListV5linux/linux0dd1e247fd39aed20fd2baacc62ca44d82534798 — 1c5f0d3f480abd8c26761b6b1f486822e77faea3+9
🔴Vulnerability Details
3OSV▶
CVE-2022-50625: In the Linux kernel, the following vulnerability has been resolved: serial: amba-pl011: avoid SBSA UART accessing DMACR register Chapter "B Generic UA↗2025-12-08
GHSA▶
GHSA-rcpg-h79p-wgf5: In the Linux kernel, the following vulnerability has been resolved:
serial: amba-pl011: avoid SBSA UART accessing DMACR register
Chapter "B Generic↗2025-12-08