CVE-2022-50647
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0.0-rc2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel affects RISC-V architectures by causing port I/O string accessors (such as insb, outsb) to use the physical PCI port I/O address incorrectly instead of the proper memory mapping. This leads to failures in accessing PCIe parallel ports, causing memory access faults and kernel crashes when drivers like the parport driver attempt to communicate with hardware ports.
How can this vulnerability impact me? :
The vulnerability can cause kernel crashes and memory access faults when using PCIe parallel ports on RISC-V systems. This can lead to system instability or failure of hardware communication through affected drivers, potentially disrupting normal operations that rely on these ports.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by correcting the port I/O string accessors in the Linux kernel to use the correct physical PCI port I/O address with PCI_IOBASE offset. Immediate mitigation involves updating the Linux kernel to a version that includes this fix, ensuring that the parport driver and related PCIe parallel port accessors are properly patched.