CVE-2022-50647 — Linux vulnerability
6 documents5 sources
Severity
—N/A
No vectorEPSS
0.0%
top 85.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 9
Description
In the Linux kernel, the following vulnerability has been resolved:
RISC-V: Make port I/O string accessors actually work
Fix port I/O string accessors such as `insb', `outsb', etc. which use
the physical PCI port I/O address rather than the corresponding memory
mapping to get at the requested location, which in turn breaks at least
accesses made by our parport driver to a PCIe parallel port such as:
PCI parallel port detected: 1415:c118, I/O at 0x1000(0x1008), IRQ 20
parport0: PC-style at 0x1…
Affected Packages4 packages
▶CVEListV5linux/linuxfab957c11efe2f405e08b9f0d080524bc2631428 — 2c60db6869fe5213471fcf4fe5704dc29da8b5ee+6
🔴Vulnerability Details
3OSV▶
CVE-2022-50647: In the Linux kernel, the following vulnerability has been resolved: RISC-V: Make port I/O string accessors actually work Fix port I/O string accessors↗2025-12-09
GHSA▶
GHSA-gvvr-vj5m-jq76: In the Linux kernel, the following vulnerability has been resolved:
RISC-V: Make port I/O string accessors actually work
Fix port I/O string accesso↗2025-12-09