CVE-2022-50036
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-13
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-191 | The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's drm/sun4i driver related to the DSI (Display Serial Interface). The issue is that packet overhead is subtracted using unsigned arithmetic, which can cause an underflow when a short sync pulse is present. This underflow causes the value to wrap around to a very large number (near the maximum for a 16-bit unsigned integer). The fix involves using signed subtraction to prevent this underflow and correctly handle negative values with a max() function.
How can this vulnerability impact me? :
The vulnerability can cause incorrect computation of packet sizes in the display driver, potentially leading to underflow and incorrect behavior in the handling of display timings. This could result in display issues or instability in systems using the affected driver.