CVE-2022-49320

Source
https://cve.org/CVERecord?id=CVE-2022-49320
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49320.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49320
Downstream
Related
Published
2025-02-26T02:10:45.703Z
Modified
2026-04-11T12:43:53.873941Z
Summary
dmaengine: zynqmp_dma: In struct zynqmp_dma_chan fix desc_size data type
Details

In the Linux kernel, the following vulnerability has been resolved:

dmaengine: zynqmpdma: In struct zynqmpdmachan fix descsize data type

In zynqmpdmaalloc/freechanresources functions there is a potential overflow in the below expressions.

dmaalloccoherent(chan->dev, (2 * chan->descsize * ZYNQMPDMANUMDESCS), &chan->descpoolp, GFP_KERNEL);

dmafreecoherent(chan->dev,(2 * ZYNQMPDMADESCSIZE(chan) * ZYNQMPDMANUMDESCS), chan->descpoolv, chan->descpoolp);

The arguments descsize and ZYNQMPDMANUMDESCS were 32 bit. Though this overflow condition is not observed but it is a potential problem in the case of 32-bit multiplication. Hence fix it by changing the descsize data type to sizet.

In addition to coverity fix it also reuse ZYNQMPDMADESCSIZE macro in dmaalloc_coherent API argument.

Addresses-Coverity: Event overflowbeforewiden.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49320.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b0cc417c1637192be658e68a74c8d1568e3d35f6
Fixed
83960276ffc9bf5570d4106490346b61e61be5f3
Fixed
95a0ba85c1b51b36e909841c02d205cd223ab753
Fixed
7b5488f4721fed6e121e661e165bab06ae2f8675
Fixed
4838969e4d95d2bd2995d1605b20d3144fcb3e74
Fixed
90aefae2e3a770a6909d339f5d8a988c0b0ceaf0
Fixed
f9a9f43a62a04ec3183fb0da9226c7706eed0115

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49320.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.8.0
Fixed
5.4.198
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.122
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.47
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.17.15
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49320.json"