{"id":"CVE-2022-0854","details":"A memory leak flaw was found in the Linux kernel’s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.","modified":"2026-03-23T05:07:35.291304Z","published":"2022-03-23T20:15:10.423Z","related":["ALSA-2022:7444","ALSA-2022:7683","ALSA-2022:7933","ALSA-2022:8267","SUSE-SU-2022:1163-1","SUSE-SU-2022:1183-1","SUSE-SU-2022:1197-1","SUSE-SU-2022:1257-1","SUSE-SU-2022:1407-1","SUSE-SU-2024:2929-1","SUSE-SU-2024:3249-1","SUSE-SU-2024:3499-1","SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0350-1","SUSE-SU-2026:0369-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5161"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5173"},{"type":"EVIDENCE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"5.16"}]},{"events":[{"introduced":"0"},{"last_affected":"5.17-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"5.17-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.17-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.17-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.17-rc4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.17-rc5"}]},{"events":[{"introduced":"0"},{"last_affected":"5.17-rc6"}]},{"events":[{"introduced":"0"},{"last_affected":"5.17-rc7"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-0854.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}