CVE-2022-50055

Source
https://cve.org/CVERecord?id=CVE-2022-50055
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50055.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50055
Downstream
Related
Published
2025-06-18T11:01:59.568Z
Modified
2026-05-12T03:52:20.976355102Z
Summary
iavf: Fix adminq error handling
Details

In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix adminq error handling

iavfallocasqbufs/iavfallocarqbufs allocates with dmaalloccoherent memory for VF mailbox. Free DMA regions for both ASQ and ARQ in case error happens during configuration of ASQ/ARQ registers. Without this change it is possible to see when unloading interface: 74626.583369: dmadebugdevicechange: device driver has pending DMA allocations while released from device [count=32] One of leaked entries details: [device address=0x0000000b27ff9000] [size=4096 bytes] [mapped with DMABIDIRECTIONAL] [mapped as coherent]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50055.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d358aa9a7a2d5f91b1d33d5d4e27c2e46638d123
Fixed
ff289f2be5899efd0e897d2b434a78e36df2c69b
Fixed
4fe80492d53971d9a49f39f3c86d2d67c6f3638a
Fixed
dab6b551f5ba4c79a0dd4970dd8533c37a7b100f
Fixed
35c63581fdefdcbaeae8cded18908523252353ad
Fixed
419831617ed349992c84344dbd9e627f9e68f842

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50055.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.14.0
Fixed
5.4.211
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.138
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.63
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50055.json"