
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability (CVE-2022-50023) was identified in the DMA engine's AXI DMA controller. The issue occurs when a channel has no descriptor and an interrupt is raised, causing the kernel to OOPS. This vulnerability affects various Linux distributions including Debian bullseye and bookworm releases (Debian Tracker).
The vulnerability exists in the dmaengine subsystem, specifically in the Synopsys DesignWare AXI DMA controller (dw-axi-dmac). The issue manifests when the handler axichanblockxfercomplete() is called without checking the result of vchannextdesc(), leading to a kernel OOPS condition (NVD).
When exploited, this vulnerability causes the Linux kernel to OOPS, potentially leading to system instability or denial of service conditions (Wiz).
The vulnerability has been fixed in newer kernel versions. Debian has addressed this in bookworm (6.1.137-1) and later versions. The fix involves adding a check for the result of vchannextdesc() in the handler axichanblockxfercomplete() (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."