CVE-2022-50625Improper Restriction of Operations within the Bounds of a Memory Buffer in Linux

Severity
5.8MEDIUM
No vector
EPSS
0.1%
top 80.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

In the Linux kernel, the following vulnerability has been resolved: serial: amba-pl011: avoid SBSA UART accessing DMACR register Chapter "B Generic UART" in "ARM Server Base System Architecture" [1] documentation describes a generic UART interface. Such generic UART does not support DMA. In current code, sbsa_uart_pops and amba_pl011_pops share the same stop_rx operation, which will invoke pl011_dma_rx_stop, leading to an access of the DMACR register. This commit adds a using_rx_dma check in p

Affected Packages4 packages

Linuxlinux/linux_kernel4.2.04.9.337+7
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux0dd1e247fd39aed20fd2baacc62ca44d825347981c5f0d3f480abd8c26761b6b1f486822e77faea3+9
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
OSV
serial: amba-pl011: avoid SBSA UART accessing DMACR register2025-12-08
OSV
CVE-2022-50625: In the Linux kernel, the following vulnerability has been resolved: serial: amba-pl011: avoid SBSA UART accessing DMACR register Chapter "B Generic UA2025-12-08
GHSA
GHSA-rcpg-h79p-wgf5: In the Linux kernel, the following vulnerability has been resolved: serial: amba-pl011: avoid SBSA UART accessing DMACR register Chapter "B Generic2025-12-08

📋Vendor Advisories

2
Red Hat
kernel: serial: amba-pl011: avoid SBSA UART accessing DMACR register2025-12-08
Debian
CVE-2022-50625: linux - In the Linux kernel, the following vulnerability has been resolved: serial: amb...2022