CVE-2022-50526
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory corruption issue in the Linux kernel's drm/msm/dp component. It occurs because there was a missing sanity check on the bridge counter, which could lead to data corruption beyond the fixed-sized bridge array if more than eight bridges were present. The issue has been fixed by adding the necessary sanity check.
How can this vulnerability impact me? :
The vulnerability can cause memory corruption in the Linux kernel, which may lead to system instability, crashes, or potentially allow an attacker to execute arbitrary code or cause denial of service. The exact impact depends on the system's use of the affected drm/msm/dp component and whether it encounters more than eight bridges.