CVE-2022-50541
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/10/2025
Last modified:
04/02/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
dmaengine: ti: k3-udma: Reset UDMA_CHAN_RT byte counters to prevent overflow<br />
<br />
UDMA_CHAN_RT_*BCNT_REG stores the real-time channel bytecount statistics.<br />
These registers are 32-bit hardware counters and the driver uses these<br />
counters to monitor the operational progress status for a channel, when<br />
transferring more than 4GB of data it was observed that these counters<br />
overflow and completion calculation of a operation gets affected and the<br />
transfer hangs indefinitely.<br />
<br />
This commit adds changes to decrease the byte count for every complete<br />
transaction so that these registers never overflow and the proper byte<br />
count statistics is maintained for ongoing transaction by the RT counters.<br />
<br />
Earlier uc->bcnt used to maintain a count of the completed bytes at driver<br />
side, since the RT counters maintain the statistics of current transaction<br />
now, the maintenance of uc->bcnt is not necessary.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.6 (including) | 5.15.75 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.19.17 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (including) | 6.0.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



