-
CVE-2022-50437
- EPSS 0.03%
- Veröffentlicht 01.10.2025 12:15:35
- Zuletzt bearbeitet 02.10.2025 19:12:17
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: drm/msm/hdmi: fix memory corruption with too many bridges Add the missing sanity check on the bridge counter to avoid corrupting data beyond the fixed-sized bridge array in case there are ever more than eight bridges. Patchwork: https://patchwork.freedesktop.org/patch/502670/
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
a9c1a6991a9b5aa6d0f2cbc9b8c3bf6c4d094dfa
Version
a3376e3ec81c5dd0622cbc187db76d2824d31c1c
Status
affected
Version <
e8f916b84e4b028ecad6c6472eaad543cc7df806
Version
a3376e3ec81c5dd0622cbc187db76d2824d31c1c
Status
affected
Version <
3c43f3ec731c233eb84b66199ee76dbf3ec6ecae
Version
a3376e3ec81c5dd0622cbc187db76d2824d31c1c
Status
affected
Version <
ed7f1ff87a4afea1bc220d2ff00a7ce8e61f0b53
Version
a3376e3ec81c5dd0622cbc187db76d2824d31c1c
Status
affected
Version <
08c7375fa27a8ceee028868e03ffb3a0db919d44
Version
a3376e3ec81c5dd0622cbc187db76d2824d31c1c
Status
affected
Version <
b48949ab451eaf1e2c04c272c8a9a96a2b56546f
Version
a3376e3ec81c5dd0622cbc187db76d2824d31c1c
Status
affected
Version <
9efb45b45ff6254bfd1f1997a06725cb3fc998a5
Version
a3376e3ec81c5dd0622cbc187db76d2824d31c1c
Status
affected
Version <
4c1294da6aed1f16d47a417dcfe6602833c3c95c
Version
a3376e3ec81c5dd0622cbc187db76d2824d31c1c
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.12
Status
affected
Version <
3.12
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.332
Status
unaffected
Version <=
4.14.*
Version
4.14.298
Status
unaffected
Version <=
4.19.*
Version
4.19.264
Status
unaffected
Version <=
5.4.*
Version
5.4.223
Status
unaffected
Version <=
5.10.*
Version
5.10.153
Status
unaffected
Version <=
5.15.*
Version
5.15.77
Status
unaffected
Version <=
6.0.*
Version
6.0.7
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.081 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|