-
CVE-2022-50781
- EPSS 0.04%
- Veröffentlicht 24.12.2025 13:06:09
- Zuletzt bearbeitet 29.12.2025 15:58:34
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table() In the PP_OD_EDIT_VDDC_CURVE case the "input_index" variable is capped at 2 but not checked for negative values so it results in an out of bounds read. This value comes from the user via sysfs.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
4d3dc0de9c46d9f73be6bac026e40b893e37ea21
Version
d5bf26539494d16dfabbbea0854a47d202ea15c0
Status
affected
Version <
85273b4a7076ed5328c8ace02234e4e7e10972d5
Version
d5bf26539494d16dfabbbea0854a47d202ea15c0
Status
affected
Version <
f289a38df0da4cfe4b50d04b1b9c3bc646fecd57
Version
d5bf26539494d16dfabbbea0854a47d202ea15c0
Status
affected
Version <
a03625ad11b50429930f4c491d6c97e70f2ba89a
Version
d5bf26539494d16dfabbbea0854a47d202ea15c0
Status
affected
Version <
8084bd0a64e278314b733993f388d83a86aa1183
Version
d5bf26539494d16dfabbbea0854a47d202ea15c0
Status
affected
Version <
d27252b5706e51188aed7647126e44dcf9e940c1
Version
d5bf26539494d16dfabbbea0854a47d202ea15c0
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.20
Status
affected
Version <
4.20
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.1 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|