CVE-2022-50185

In the Linux kernel, the following vulnerability has been resolved: drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() The last case label can write two buffers 'mc_reg_address[j]' and 'mc_data[j]' with 'j' offset equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE since there are no checks for this value in both case labels after the last 'j++'. Instead of changing '>' to '>=' there, add the bounds check at the start of the second 'case' (the first one already has it). Also, remove redundant last checks for 'j' index bigger than array size. The expression is always false. Moreover, before or after the patch 'table->last' can be equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE and it seems it can be a valid value. Detected using the static analysis tool - Svace.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

19 Nov 2025, 12:51

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/136f614931a2bb73616b292cf542da3a18daefd5 - () https://git.kernel.org/stable/c/136f614931a2bb73616b292cf542da3a18daefd5 - Patch
References () https://git.kernel.org/stable/c/1f341053852be76f82610ce47a505d930512f05c - () https://git.kernel.org/stable/c/1f341053852be76f82610ce47a505d930512f05c - Patch
References () https://git.kernel.org/stable/c/782e413e38dffd37cc85b08b1ccb982adb4a93ce - () https://git.kernel.org/stable/c/782e413e38dffd37cc85b08b1ccb982adb4a93ce - Patch
References () https://git.kernel.org/stable/c/8508d6d23a247c29792ce2fc0df3f3404d6a6a80 - () https://git.kernel.org/stable/c/8508d6d23a247c29792ce2fc0df3f3404d6a6a80 - Patch
References () https://git.kernel.org/stable/c/9faff03617afeced1c4e5daa89e79b3906374342 - () https://git.kernel.org/stable/c/9faff03617afeced1c4e5daa89e79b3906374342 - Patch
References () https://git.kernel.org/stable/c/db1a9add3f90ff1c641974d5bb910c16b87af4ef - () https://git.kernel.org/stable/c/db1a9add3f90ff1c641974d5bb910c16b87af4ef - Patch
References () https://git.kernel.org/stable/c/deb603c5928e546609c0d5798e231d0205748943 - () https://git.kernel.org/stable/c/deb603c5928e546609c0d5798e231d0205748943 - Patch
References () https://git.kernel.org/stable/c/ea73869df6ef386fc0feeb28ff66742ca835b18f - () https://git.kernel.org/stable/c/ea73869df6ef386fc0feeb28ff66742ca835b18f - Patch
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/radeon: corrige un desbordamiento de búfer potencial en ni_set_mc_special_registers() La última etiqueta de caso puede escribir dos búferes 'mc_reg_address[j]' y 'mc_data[j]' con el desplazamiento 'j' igual a SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE ya que no hay comprobaciones para este valor en ambas etiquetas de caso después del último 'j++'. En lugar de cambiar ">" a ">=" allí, agregue la comprobación de los límites al comienzo del segundo 'caso' (el primero ya lo tiene). Además, elimine las últimas comprobaciones redundantes para el índice 'j' mayor que el tamaño del arreglo. La expresión siempre es falsa. Además, antes o después del parche 'table->last' puede ser igual a SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE y parece que puede ser un valor válido. Detectado usando la herramienta de análisis estático - Svace.

18 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 11:15

Updated : 2025-11-19 12:51


NVD link : CVE-2022-50185

Mitre link : CVE-2022-50185

CVE.ORG link : CVE-2022-50185


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write