2025-03-09 03:03:50 +00:00

29 lines
1.7 KiB
JSON

{
"id": "CVE-2022-49500",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:26.163",
"lastModified": "2025-02-26T07:01:26.163",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwl1251: dynamically allocate memory used for DMA\n\nWith introduction of vmap'ed stacks, stack parameters can no\nlonger be used for DMA and now leads to kernel panic.\n\nIt happens at several places for the wl1251 (e.g. when\naccessed through SDIO) making it unuseable on e.g. the\nOpenPandora.\n\nWe solve this by allocating temporary buffers or use wl1251_read32().\n\nTested on v5.18-rc5 with OpenPandora."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wl1251: asignar din\u00e1micamente memoria utilizada para DMA Con la introducci\u00f3n de pilas vmap'ed, los par\u00e1metros de pila ya no se pueden utilizar para DMA y ahora provoca un p\u00e1nico del kernel. Sucede en varios lugares para wl1251 (por ejemplo, cuando se accede a trav\u00e9s de SDIO), lo que lo hace inutilizable en, por ejemplo, OpenPandora. Solucionamos esto asignando b\u00faferes temporales o utilizando wl1251_read32(). Probado en v5.18-rc5 con OpenPandora."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/454744754cbf2c21b3fc7344e46e10bee2768094",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/da03bbfbf5acd1ab0b074617e865ad1e8a5779ef",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}