CVE-2022-50614

Source
https://cve.org/CVERecord?id=CVE-2022-50614
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50614.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50614
Downstream
Related
Published
2025-12-08T01:16:26.689Z
Modified
2026-03-20T12:22:36.179951Z
Summary
misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic
Details

In the Linux kernel, the following vulnerability has been resolved:

misc: pciendpointtest: Fix pciendpointtest_{copy,write,read}() panic

The dmamapsingle() doesn't permit zero length mapping. It causes a follow panic.

A panic was reported on arm64:

[ 60.137988] ------------[ cut here ]------------ [ 60.142630] kernel BUG at kernel/dma/swiotlb.c:624! [ 60.147508] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP [ 60.152992] Modules linked in: dwhdmicec crct10difce simplebridge rcarfdp1 vsp1 rcarvin videobuf2vmalloc rcarcsi2 v4l 2mem2mem videobuf2dmacontig videobuf2memops pciendpointtest videobuf2v4l2 videobuf2common rcarfcp v4l2fwnode v4l2asyn c videodev mc gpiobd9571mwv max9611 pwmrcar ccree at24 authenc libdes phyrcargen3usb3 usbdmac displayconnector pwmbl [ 60.186252] CPU: 0 PID: 508 Comm: pcitest Not tainted 6.0.0-rc1rpci-dev+ #237 [ 60.193387] Hardware name: Renesas Salvator-X 2nd version board based on r8a77951 (DT) [ 60.201302] pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 60.208263] pc : swiotlbtblmapsingle+0x2c0/0x590 [ 60.213149] lr : swiotlbmap+0x88/0x1f0 [ 60.216982] sp : ffff80000a883bc0 [ 60.220292] x29: ffff80000a883bc0 x28: 0000000000000000 x27: 0000000000000000 [ 60.227430] x26: 0000000000000000 x25: ffff0004c0da20d0 x24: ffff80000a1f77c0 [ 60.234567] x23: 0000000000000002 x22: 0001000040000010 x21: 000000007a000000 [ 60.241703] x20: 0000000000200000 x19: 0000000000000000 x18: 0000000000000000 [ 60.248840] x17: 0000000000000000 x16: 0000000000000000 x15: ffff0006ff7b9180 [ 60.255977] x14: ffff0006ff7b9180 x13: 0000000000000000 x12: 0000000000000000 [ 60.263113] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000 [ 60.270249] x8 : 0001000000000010 x7 : ffff0004c6754b20 x6 : 0000000000000000 [ 60.277385] x5 : ffff0004c0da2090 x4 : 0000000000000000 x3 : 0000000000000001 [ 60.284521] x2 : 0000000040000000 x1 : 0000000000000000 x0 : 0000000040000010 [ 60.291658] Call trace: [ 60.294100] swiotlbtblmapsingle+0x2c0/0x590 [ 60.298629] swiotlbmap+0x88/0x1f0 [ 60.302115] dmamappageattrs+0x188/0x230 [ 60.306299] pciendpointtestioctl+0x5e4/0xd90 [pciendpoint_test] [ 60.312660] _arm64sysioctl+0xa8/0xf0 [ 60.316583] invokesyscall+0x44/0x108 [ 60.320334] el0svccommon.constprop.0+0xcc/0xf0 [ 60.325038] doel0svc+0x2c/0xb8 [ 60.328351] el0svc+0x2c/0x88 [ 60.331406] el0t64synchandler+0xb8/0xc0 [ 60.335587] el0t64sync+0x18c/0x190 [ 60.339251] Code: 52800013 d2e00414 35fff45c d503201f (d4210000) [ 60.345344] ---[ end trace 0000000000000000 ]---

To fix it, this patch adds a checking the payload length if it is zero.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50614.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
343dc693f7b79885197f9d37dd8b711b0e3ffc8f
Fixed
0df206bdc6204b758585bbe159a55e23e7917b13
Fixed
e5ebcbb4f967af2083d409271aaf7c7d8351603f
Fixed
279116cb0bc5cd8af65d6a00ffe074bd09842f88
Fixed
6c01739c2aba19553beb20491b05515af9246f0f
Fixed
8e30538eca016de8e252bef174beadecd64239f0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50614.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
5.10.148
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.74
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.16
Type
ECOSYSTEM
Events
Introduced
5.20.0
Fixed
6.0.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50614.json"