CVE-2022-50036

In the Linux kernel, the following vulnerability has been resolved: drm/sun4i: dsi: Prevent underflow when computing packet sizes Currently, the packet overhead is subtracted using unsigned arithmetic. With a short sync pulse, this could underflow and wrap around to near the maximal u16 value. Fix this by using signed subtraction. The call to max() will correctly handle any negative numbers that are produced. Apply the same fix to the other timings, even though those subtractions are less likely to underflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*

History

13 Nov 2025, 18:42

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CWE CWE-191
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/82a1356a933d8443139f8886f11b63c974a09a67 - () https://git.kernel.org/stable/c/82a1356a933d8443139f8886f11b63c974a09a67 - Patch
References () https://git.kernel.org/stable/c/98e28de472ef248352f04f87e29e634ebb0ec240 - () https://git.kernel.org/stable/c/98e28de472ef248352f04f87e29e634ebb0ec240 - Patch
References () https://git.kernel.org/stable/c/a1e7908f78f5a7f53f8cd83c7dcdfec974c95f26 - () https://git.kernel.org/stable/c/a1e7908f78f5a7f53f8cd83c7dcdfec974c95f26 - Patch
References () https://git.kernel.org/stable/c/fb837f5b83461624e525727a8f4add14b201147e - () https://git.kernel.org/stable/c/fb837f5b83461624e525727a8f4add14b201147e - Patch

Information

Published : 2025-06-18 11:15

Updated : 2025-11-13 18:42


NVD link : CVE-2022-50036

Mitre link : CVE-2022-50036

CVE.ORG link : CVE-2022-50036


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-191

Integer Underflow (Wrap or Wraparound)