CVE-2022-50781
amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table()
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table() In the PP_OD_EDIT_VDDC_CURVE case the "input_index" variable is capped at 2 but not checked for negative values so it results in an out of bounds read. This value comes from the user via sysfs.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Dec 24, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
d5bf26539494d16dfabbbea0854a47d202ea15c0 < 4d3dc0de9c46d9f73be6bac026e40b893e37ea21 d5bf26539494d16dfabbbea0854a47d202ea15c0 < 85273b4a7076ed5328c8ace02234e4e7e10972d5 d5bf26539494d16dfabbbea0854a47d202ea15c0 < f289a38df0da4cfe4b50d04b1b9c3bc646fecd57 d5bf26539494d16dfabbbea0854a47d202ea15c0 < a03625ad11b50429930f4c491d6c97e70f2ba89a d5bf26539494d16dfabbbea0854a47d202ea15c0 < 8084bd0a64e278314b733993f388d83a86aa1183 d5bf26539494d16dfabbbea0854a47d202ea15c0 < d27252b5706e51188aed7647126e44dcf9e940c1
Linux / Linux
4.20
References
git.kernel.org: https://git.kernel.org/stable/c/4d3dc0de9c46d9f73be6bac026e40b893e37ea21 git.kernel.org: https://git.kernel.org/stable/c/85273b4a7076ed5328c8ace02234e4e7e10972d5 git.kernel.org: https://git.kernel.org/stable/c/f289a38df0da4cfe4b50d04b1b9c3bc646fecd57 git.kernel.org: https://git.kernel.org/stable/c/a03625ad11b50429930f4c491d6c97e70f2ba89a git.kernel.org: https://git.kernel.org/stable/c/8084bd0a64e278314b733993f388d83a86aa1183 git.kernel.org: https://git.kernel.org/stable/c/d27252b5706e51188aed7647126e44dcf9e940c1