Home

Description

In the Linux kernel, the following vulnerability has been resolved: fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() The "hdr.count * sizeof(s32)" multiplication can overflow on 32 bit systems leading to memory corruption. Use array_size() to fix that.

PUBLISHED Reserved 2025-12-08 | Published 2025-12-08 | Updated 2025-12-08 | Assigner Linux

Product status

Default status
unaffected

322b598be4d9b9090cda560c4caab78704615ab4 (git) before f59861946fa51bcc1f305809e4ebc1013b0ee61c
affected

322b598be4d9b9090cda560c4caab78704615ab4 (git) before b94605f5cb99e90c8ca91523597a40e1bd59546b
affected

322b598be4d9b9090cda560c4caab78704615ab4 (git) before 1b5a931594f7ffd26d706614c37d4da0f2ffb6e7
affected

322b598be4d9b9090cda560c4caab78704615ab4 (git) before 940253af8b3865b76de8d1b46bcd4a700104852e
affected

322b598be4d9b9090cda560c4caab78704615ab4 (git) before 939bc5453b8cbdde9f1e5110ce8309aedb1b501a
affected

Default status
affected

5.9
affected

Any version before 5.9
unaffected

5.10.150 (semver)
unaffected

5.15.75 (semver)
unaffected

5.19.17 (semver)
unaffected

6.0.3 (semver)
unaffected

6.1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/f59861946fa51bcc1f305809e4ebc1013b0ee61c

git.kernel.org/...c/b94605f5cb99e90c8ca91523597a40e1bd59546b

git.kernel.org/...c/1b5a931594f7ffd26d706614c37d4da0f2ffb6e7

git.kernel.org/...c/940253af8b3865b76de8d1b46bcd4a700104852e

git.kernel.org/...c/939bc5453b8cbdde9f1e5110ce8309aedb1b501a

cve.org (CVE-2022-50623)

nvd.nist.gov (CVE-2022-50623)

Download JSON