CVE-2022-50142

In the Linux kernel, the following vulnerability has been resolved: intel_th: msu: Fix vmalloced buffers After commit f5ff79fddf0e ("dma-mapping: remove CONFIG_DMA_REMAP") there's a chance of DMA buffer getting allocated via vmalloc(), which messes up the mmapping code: > RIP: msc_mmap_fault [intel_th_msu] > Call Trace: > <TASK> > __do_fault > do_fault ... Fix this by accounting for vmalloc possibility.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

19 Nov 2025, 13:29

Type Values Removed Values Added
CWE CWE-787
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: intel_th: msu: Reparar búferes vmalloced Después de el commit f5ff79fddf0e ("dma-mapping: remove CONFIG_DMA_REMAP") existe la posibilidad de que el buffer DMA se asigne a través de vmalloc(), lo que arruina el código mmapping: &gt; RIP: msc_mmap_fault [intel_th_msu] &gt; Rastreo de llamada: &gt; &gt; __do_fault &gt; do_fault ... Solucione esto teniendo en cuenta la posibilidad de vmalloc.
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/0ed72c6bc632cbf8d979ac60f982ff84b7bb610a - () https://git.kernel.org/stable/c/0ed72c6bc632cbf8d979ac60f982ff84b7bb610a - Patch
References () https://git.kernel.org/stable/c/4914c50670b6a531e2cb17cd984cc565b4681312 - () https://git.kernel.org/stable/c/4914c50670b6a531e2cb17cd984cc565b4681312 - Patch
References () https://git.kernel.org/stable/c/566887bad7ff2297d6b3f9659c702ba075f3d62d - () https://git.kernel.org/stable/c/566887bad7ff2297d6b3f9659c702ba075f3d62d - Patch
References () https://git.kernel.org/stable/c/6ae2881c1d1fa0e33f4763b7c786f8ef05a9c828 - () https://git.kernel.org/stable/c/6ae2881c1d1fa0e33f4763b7c786f8ef05a9c828 - Patch
References () https://git.kernel.org/stable/c/ac12ad3ccf6d386e64a9d6a890595a2509d24edd - () https://git.kernel.org/stable/c/ac12ad3ccf6d386e64a9d6a890595a2509d24edd - Patch
References () https://git.kernel.org/stable/c/b5d924cb4c7b952eaa61622f14427723a78137a3 - () https://git.kernel.org/stable/c/b5d924cb4c7b952eaa61622f14427723a78137a3 - Patch

18 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 11:15

Updated : 2025-11-19 13:29


NVD link : CVE-2022-50142

Mitre link : CVE-2022-50142

CVE.ORG link : CVE-2022-50142


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write