CVE-2022-49320

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49320
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49320.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49320
Downstream
Related
Published
2025-02-26T07:01:08Z
Modified
2025-09-22T20:46:23Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

dmaengine: zynqmpdma: In struct zynqmpdmachan fix descsize data type

In zynqmpdmaalloc/freechanresources functions there is a potential overflow in the below expressions.

dmaalloccoherent(chan->dev, (2 * chan->descsize * ZYNQMPDMANUMDESCS), &chan->descpoolp, GFP_KERNEL);

dmafreecoherent(chan->dev,(2 * ZYNQMPDMADESCSIZE(chan) * ZYNQMPDMANUMDESCS), chan->descpoolv, chan->descpoolp);

The arguments descsize and ZYNQMPDMANUMDESCS were 32 bit. Though this overflow condition is not observed but it is a potential problem in the case of 32-bit multiplication. Hence fix it by changing the descsize data type to sizet.

In addition to coverity fix it also reuse ZYNQMPDMADESCSIZE macro in dmaalloc_coherent API argument.

Addresses-Coverity: Event overflowbeforewiden.

References

Affected packages