CVE-2022-50261
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a mismatch in the return type of certain functions (sti_dvo_connector_mode_valid, sti_hda_connector_mode_valid, sti_hdmi_connector_mode_valid) in the Linux kernel's DRM STI driver. These functions were returning an int type instead of the expected enum drm_mode_status type. With Clang's kernel control flow integrity (kCFI) enabled, this mismatch causes runtime failures such as kernel panics or thread termination because indirect call targets are validated against expected function prototypes. The fix adjusts the return types of these functions to match the expected prototype, resolving the issue.
How can this vulnerability impact me? :
If this vulnerability is present and Clang's kernel control flow integrity (kCFI) is enabled, it can cause runtime failures in the Linux kernel, such as kernel panics or threads being killed. This can lead to system instability or crashes, potentially disrupting normal operation of systems running the affected Linux kernel.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by correcting the return type of the functions sti_dvo_connector_mode_valid, sti_hda_connector_mode_valid, and sti_hdmi_connector_mode_valid to match the expected prototype return type 'enum drm_mode_status' instead of 'int'. To mitigate this vulnerability, update your Linux kernel to a version that includes this fix.