In the Linux kernel, the following vulnerability has been resolved:
drm/sun4i: dsi: Prevent underflow when computing packet sizes
Currently, the packet overhead is subtracted using unsigned arithmetic.
With a short sync pulse, this could underflow and wrap around to near
the maximal u16 value. Fix this by using signed subtraction. The call to
max() will correctly handle any negative numbers that are produced.
Apply the same fix to the other timings, even though those subtractions
are less likely to underflow.
References
Configurations
Configuration 1 (hide)
|
History
13 Nov 2025, 18:42
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux linux Kernel
Linux |
|
| CWE | CWE-191 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/82a1356a933d8443139f8886f11b63c974a09a67 - Patch | |
| References | () https://git.kernel.org/stable/c/98e28de472ef248352f04f87e29e634ebb0ec240 - Patch | |
| References | () https://git.kernel.org/stable/c/a1e7908f78f5a7f53f8cd83c7dcdfec974c95f26 - Patch | |
| References | () https://git.kernel.org/stable/c/fb837f5b83461624e525727a8f4add14b201147e - Patch |
Information
Published : 2025-06-18 11:15
Updated : 2025-11-13 18:42
NVD link : CVE-2022-50036
Mitre link : CVE-2022-50036
CVE.ORG link : CVE-2022-50036
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)
