CVE-2022-50774Function Call with Incorrectly Specified Arguments in Linux

Severity
5.3MEDIUM
No vector
EPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: qat - fix DMA transfer direction When CONFIG_DMA_API_DEBUG is selected, while running the crypto self test on the QAT crypto algorithms, the function add_dma_entry() reports a warning similar to the one below, saying that overlapping mappings are not supported. This occurs in tests where the input and the output scatter list point to the same buffers (i.e. two different scatter lists which point to the same chunks of m

Affected Packages4 packages

Linuxlinux/linux_kernel3.17.05.10.150+3
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linuxd370cec3219490656d72f5ae6e5df32c113c5a44426d5bc089e7731e36b514d1beca19e777a2d653+5
debiandebian/linux< linux 6.0.3-1 (bookworm)

🔴Vulnerability Details

3
OSV
crypto: qat - fix DMA transfer direction2025-12-24
OSV
CVE-2022-50774: In the Linux kernel, the following vulnerability has been resolved: crypto: qat - fix DMA transfer direction When CONFIG_DMA_API_DEBUG is selected, wh2025-12-24
GHSA
GHSA-c9vq-m3c3-2m7g: In the Linux kernel, the following vulnerability has been resolved: crypto: qat - fix DMA transfer direction When CONFIG_DMA_API_DEBUG is selected,2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: crypto: qat - fix DMA transfer direction2025-12-24
Debian
CVE-2022-50774: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: qat...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50774 Impact, Exploitability, and Mitigation Steps | Wiz