In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dsi: fix memory corruption with too many bridges
Add the missing sanity check on the bridge counter to avoid corrupting
data beyond the fixed-sized bridge array in case there are ever more
than eight bridges.
Patchwork: https://patchwork.freedesktop.org/patch/502668/
References
Configurations
Configuration 1 (hide)
|
History
12 Dec 2025, 16:35
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| First Time |
Linux
Linux linux Kernel |
|
| CWE | CWE-787 | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/21c4679af01f1027cb559330c2e7d410089b2b36 - Patch | |
| References | () https://git.kernel.org/stable/c/2e786eb2f9cebb07e317226b60054df510b60c65 - Patch | |
| References | () https://git.kernel.org/stable/c/4e5587cddb334f7a5bb1c49ea8bbfc966fafe1b8 - Patch | |
| References | () https://git.kernel.org/stable/c/9f035d1fb30648fe70ee01627eb131c56d699b35 - Patch | |
| References | () https://git.kernel.org/stable/c/e83b354890a3c1d5256162f87a6cc38c47ae7f20 - Patch | |
| References | () https://git.kernel.org/stable/c/f649ed0e1b7a1545f8e27267d3c468b3cb222ece - Patch |
17 Sep 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-17 15:15
Updated : 2025-12-12 16:35
NVD link : CVE-2022-50368
Mitre link : CVE-2022-50368
CVE.ORG link : CVE-2022-50368
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write
