CVE-2022-50623
Description
In the Linux kernel, the following vulnerability has been resolved:
fpga: prevent integer overflow in dfl_feature_ioctl_set_irq()
The "hdr.count * sizeof(s32)" multiplication can overflow on 32 bit systems leading to memory corruption. Use array_size() to fix that.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Integer overflow in Linux kernel's FPGA DFL feature ioctl can lead to memory corruption on 32-bit systems.
Vulnerability
In the Linux kernel, the dfl_feature_ioctl_set_irq() function in the FPGA DFL (Device Feature List) subsystem contains an integer overflow vulnerability. The multiplication hdr.count * sizeof(s32) can overflow on 32-bit systems, potentially leading to memory corruption [1].
Exploitation
An attacker with the ability to invoke the affected ioctl on a DFL device can trigger the overflow by providing a large hdr.count value. The overflow occurs during the calculation of the size for a memory allocation, which may result in a smaller buffer than required, leading to out-of-bounds writes [2].
Impact
Successful exploitation could allow an attacker to corrupt kernel memory, potentially leading to privilege escalation or system crash. The vulnerability is specific to 32-bit architectures where the multiplication overflow is possible.
Mitigation
The fix uses the array_size() helper to safely compute the allocation size, preventing the overflow. The patch has been applied to the stable kernel tree [1][2]. Users should update to a patched kernel version.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
5f59861946fa5b94605f5cb991b5a931594f7940253af8b38939bc5453b8cVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/1b5a931594f7ffd26d706614c37d4da0f2ffb6e7nvd
- git.kernel.org/stable/c/939bc5453b8cbdde9f1e5110ce8309aedb1b501anvd
- git.kernel.org/stable/c/940253af8b3865b76de8d1b46bcd4a700104852envd
- git.kernel.org/stable/c/b94605f5cb99e90c8ca91523597a40e1bd59546bnvd
- git.kernel.org/stable/c/f59861946fa51bcc1f305809e4ebc1013b0ee61cnvd
News mentions
0No linked articles in our index yet.