CVE-2022-50623

Source
https://cve.org/CVERecord?id=CVE-2022-50623
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50623.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50623
Downstream
Related
Published
2025-12-08T01:16:37.086Z
Modified
2026-03-20T12:22:36.297016Z
Summary
fpga: prevent integer overflow in dfl_feature_ioctl_set_irq()
Details

In the Linux kernel, the following vulnerability has been resolved:

fpga: prevent integer overflow in dflfeatureioctlsetirq()

The "hdr.count * sizeof(s32)" multiplication can overflow on 32 bit systems leading to memory corruption. Use array_size() to fix that.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50623.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
322b598be4d9b9090cda560c4caab78704615ab4
Fixed
f59861946fa51bcc1f305809e4ebc1013b0ee61c
Fixed
b94605f5cb99e90c8ca91523597a40e1bd59546b
Fixed
1b5a931594f7ffd26d706614c37d4da0f2ffb6e7
Fixed
940253af8b3865b76de8d1b46bcd4a700104852e
Fixed
939bc5453b8cbdde9f1e5110ce8309aedb1b501a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50623.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.9.0
Fixed
5.10.150
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.75
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.17
Type
ECOSYSTEM
Events
Introduced
5.20.0
Fixed
6.0.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50623.json"