-

CVE-2022-50526

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dp: fix memory corruption with too many bridges

Add the missing sanity check on the bridge counter to avoid corrupting
data beyond the fixed-sized bridge array in case there are ever more
than eight bridges.

Patchwork: https://patchwork.freedesktop.org/patch/502664/

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < b312fcab461bd9484c61409007a6fe059f9c2074
Version 8a3b4c17f863cde8e8743edd8faffe916c49b960
Status affected
Version < 74466e46e7543c7f74f1502181e9ba93f7521374
Version 8a3b4c17f863cde8e8743edd8faffe916c49b960
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.17
Status affected
Version < 5.17
Version 0
Status unaffected
Version <= 6.0.*
Version 6.0.7
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string