CVE-2022-50541
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
07/10/2025
Última modificación:
04/02/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
dmaengine: ti: k3-udma: Reset UDMA_CHAN_RT byte counters to prevent overflow<br />
<br />
UDMA_CHAN_RT_*BCNT_REG stores the real-time channel bytecount statistics.<br />
These registers are 32-bit hardware counters and the driver uses these<br />
counters to monitor the operational progress status for a channel, when<br />
transferring more than 4GB of data it was observed that these counters<br />
overflow and completion calculation of a operation gets affected and the<br />
transfer hangs indefinitely.<br />
<br />
This commit adds changes to decrease the byte count for every complete<br />
transaction so that these registers never overflow and the proper byte<br />
count statistics is maintained for ongoing transaction by the RT counters.<br />
<br />
Earlier uc->bcnt used to maintain a count of the completed bytes at driver<br />
side, since the RT counters maintain the statistics of current transaction<br />
now, the maintenance of uc->bcnt is not necessary.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.6 (incluyendo) | 5.15.75 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (incluyendo) | 5.19.17 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (incluyendo) | 6.0.3 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



