CVE-2022-50079
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel relates to the drm/amd/display component, specifically for DCN303 stream encoder instances. The issue is that the engine ID (eng_id) for DCN303 should not exceed 1 because there are only two instances of stream encoders. The vulnerability involves a lack of proper boundary checking for the engine ID, which could lead to out-of-bounds access. The fix ensures that the engine ID is correctly checked to prevent this out-of-bounds access.
How can this vulnerability impact me? :
If exploited, this vulnerability could cause out-of-bounds memory access in the Linux kernel's AMD display driver, potentially leading to system instability, crashes, or other unpredictable behavior. However, specific impacts such as data loss or privilege escalation are not detailed in the provided information.