SB20251008120 - Integer overflow in Linux kernel dma ti driver
Published: October 8, 2025 Updated: October 26, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Integer overflow (CVE-ID: CVE-2022-50541)
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the udma_reset_rings(), udma_reset_counters(), udma_check_tx_completion(), udma_ring_irq_handler(), udma_udma_irq_handler() and udma_tx_status() functions in drivers/dma/ti/k3-udma.c. A local user can execute arbitrary code.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/7c94dcfa8fcff2dba53915f1dabfee49a3df8b88
- https://git.kernel.org/stable/c/a065657643a62a24b4435ddcaea45f1e9378749e
- https://git.kernel.org/stable/c/d68da10b0cceb4177b653833e794b2923a4ffbd7
- https://git.kernel.org/stable/c/e0b16bfbd3a4a8d09614046335f4482313e7c0c4
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.17