CVE-2022-50541
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.0 (inc) to 6.0.3 (inc) |
| ti | k3-udma | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a flaw in the Linux kernel's dmaengine driver for the ti k3-udma hardware. The driver uses 32-bit hardware counters (UDMA_CHAN_RT_*BCNT_REG) to track the number of bytes transferred in real-time. When transferring more than 4GB of data, these counters can overflow, causing the driver to miscalculate the completion status of the transfer. This miscalculation can cause the data transfer to hang indefinitely. The fix resets these byte counters after each completed transaction to prevent overflow and maintain accurate byte count statistics.
How can this vulnerability impact me? :
If you are using the affected Linux kernel dmaengine driver for ti k3-udma hardware and transferring large amounts of data (over 4GB), this vulnerability can cause data transfers to hang indefinitely due to counter overflow and incorrect completion status calculation. This can lead to system instability or failure in data transfer operations.
What immediate steps should I take to mitigate this vulnerability?
Apply the updated Linux kernel patch that resets the UDMA_CHAN_RT byte counters to prevent overflow. This patch ensures that the byte count registers do not overflow during large data transfers, preventing transfer hangs. Until the patch is applied, avoid transferring more than 4GB of data in a single operation using the affected dmaengine ti k3-udma driver to reduce the risk of the issue.