CVE-2022-50647Linux vulnerability

6 documents5 sources
Severity
N/A
No vector
EPSS
0.0%
top 85.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: RISC-V: Make port I/O string accessors actually work Fix port I/O string accessors such as `insb', `outsb', etc. which use the physical PCI port I/O address rather than the corresponding memory mapping to get at the requested location, which in turn breaks at least accesses made by our parport driver to a PCIe parallel port such as: PCI parallel port detected: 1415:c118, I/O at 0x1000(0x1008), IRQ 20 parport0: PC-style at 0x1

Affected Packages4 packages

Linuxlinux/linux_kernel4.15.05.4.220+4
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linuxfab957c11efe2f405e08b9f0d080524bc26314282c60db6869fe5213471fcf4fe5704dc29da8b5ee+6
debiandebian/linux< linux 6.0.3-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2022-50647: In the Linux kernel, the following vulnerability has been resolved: RISC-V: Make port I/O string accessors actually work Fix port I/O string accessors2025-12-09
OSV
RISC-V: Make port I/O string accessors actually work2025-12-09
GHSA
GHSA-gvvr-vj5m-jq76: In the Linux kernel, the following vulnerability has been resolved: RISC-V: Make port I/O string accessors actually work Fix port I/O string accesso2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: RISC-V: Make port I/O string accessors actually work2025-12-09
Debian
CVE-2022-50647: linux - In the Linux kernel, the following vulnerability has been resolved: RISC-V: Mak...2022