Логотип exploitDog
bind:CVE-2022-50781
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-50781

Количество 4

Количество 4

ubuntu логотип

CVE-2022-50781

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table() In the PP_OD_EDIT_VDDC_CURVE case the "input_index" variable is capped at 2 but not checked for negative values so it results in an out of bounds read. This value comes from the user via sysfs.

EPSS: Низкий
nvd логотип

CVE-2022-50781

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table() In the PP_OD_EDIT_VDDC_CURVE case the "input_index" variable is capped at 2 but not checked for negative values so it results in an out of bounds read. This value comes from the user via sysfs.

EPSS: Низкий
debian логотип

CVE-2022-50781

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: a ...

EPSS: Низкий
github логотип

GHSA-jqf8-w9mv-cm82

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table() In the PP_OD_EDIT_VDDC_CURVE case the "input_index" variable is capped at 2 but not checked for negative values so it results in an out of bounds read. This value comes from the user via sysfs.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-50781

In the Linux kernel, the following vulnerability has been resolved: amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table() In the PP_OD_EDIT_VDDC_CURVE case the "input_index" variable is capped at 2 but not checked for negative values so it results in an out of bounds read. This value comes from the user via sysfs.

0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2022-50781

In the Linux kernel, the following vulnerability has been resolved: amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table() In the PP_OD_EDIT_VDDC_CURVE case the "input_index" variable is capped at 2 but not checked for negative values so it results in an out of bounds read. This value comes from the user via sysfs.

0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2022-50781

In the Linux kernel, the following vulnerability has been resolved: a ...

0%
Низкий
около 2 месяцев назад
github логотип
GHSA-jqf8-w9mv-cm82

In the Linux kernel, the following vulnerability has been resolved: amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table() In the PP_OD_EDIT_VDDC_CURVE case the "input_index" variable is capped at 2 but not checked for negative values so it results in an out of bounds read. This value comes from the user via sysfs.

0%
Низкий
около 2 месяцев назад

Уязвимостей на страницу