CVE-2022-50055 Affecting kernel-zfcpdump-core package, versions <0:4.18.0-372.32.1.el8_6


Severity

Recommended
high

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.03% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-KERNELZFCPDUMPCORE-12155285
  • published23 Aug 2025
  • disclosed18 Jun 2025

Introduced: 18 Jun 2025

CVE-2022-50055  (opens in a new tab)

How to fix?

Upgrade RHEL:8 kernel-zfcpdump-core to version 0:4.18.0-372.32.1.el8_6 or higher.
This issue was patched in RHSA-2022:7110.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-zfcpdump-core package and not the kernel-zfcpdump-core package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix adminq error handling

iavf_alloc_asq_bufs/iavf_alloc_arq_bufs allocates with dma_alloc_coherent memory for VF mailbox. Free DMA regions for both ASQ and ARQ in case error happens during configuration of ASQ/ARQ registers. Without this change it is possible to see when unloading interface: 74626.583369: dma_debug_device_change: device driver has pending DMA allocations while released from device [count=32] One of leaked entries details: [device address=0x0000000b27ff9000] [size=4096 bytes] [mapped with DMA_BIDIRECTIONAL] [mapped as coherent]

CVSS Base Scores

version 3.1