
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been identified in the Linux kernel's DMA engine, specifically in the TI K3 UDMA driver (CVE-2022-50541). The issue involves the UDMACHANRT byte counters that store real-time channel bytecount statistics. These 32-bit hardware counters, used for monitoring operational progress status, can overflow when transferring more than 4GB of data, causing transfer operations to hang indefinitely (NVD).
The vulnerability affects the UDMACHANRT*BCNTREG registers which are 32-bit hardware counters used to monitor channel progress. When transferring data exceeding 4GB, these counters overflow, leading to incorrect completion calculations. The issue has been assigned a CVSS v3.1 score of 6.3, indicating moderate severity (RedHat). The vulnerability requires local access and high complexity to exploit, with potential impacts on integrity and availability.
When exploited, this vulnerability can cause DMA transfers to hang indefinitely when processing large data volumes (>4GB). This affects the system's ability to complete data transfer operations correctly, potentially leading to system hangs or data transfer failures (NVD).
To mitigate this issue, it is recommended to prevent the tik3udma module from being loaded. System administrators can blacklist the kernel module to prevent it from loading automatically. For detailed instructions on blacklisting kernel modules, refer to the Red Hat documentation (RedHat).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."