CVE-2022-49969
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-13
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's AMD display driver. It occurs because the optc underflow bit is not cleared properly before turning off the ODM clock. As a result, after the ODM clock is turned off, the optc underflow bit remains set and cannot be cleared. The fix involves clearing this bit before turning off the clock to prevent the issue.
How can this vulnerability impact me? :
The vulnerability could potentially cause display or graphics issues related to the AMD display driver in the Linux kernel, such as improper handling of the optc underflow state after the ODM clock is turned off. However, specific impacts on system stability, security, or data integrity are not detailed.