CVE-2022-50781

Source
https://cve.org/CVERecord?id=CVE-2022-50781
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50781.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50781
Downstream
Related
Published
2025-12-24T13:06:09.238Z
Modified
2026-03-12T03:26:53.497345Z
Summary
amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table()
Details

In the Linux kernel, the following vulnerability has been resolved:

amdgpu/pm: prevent array underflow in vega20odneditdpmtable()

In the PPODEDITVDDCCURVE case the "input_index" variable is capped at 2 but not checked for negative values so it results in an out of bounds read. This value comes from the user via sysfs.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50781.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d5bf26539494d16dfabbbea0854a47d202ea15c0
Fixed
4d3dc0de9c46d9f73be6bac026e40b893e37ea21
Fixed
85273b4a7076ed5328c8ace02234e4e7e10972d5
Fixed
f289a38df0da4cfe4b50d04b1b9c3bc646fecd57
Fixed
a03625ad11b50429930f4c491d6c97e70f2ba89a
Fixed
8084bd0a64e278314b733993f388d83a86aa1183
Fixed
d27252b5706e51188aed7647126e44dcf9e940c1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50781.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.229
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.86
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50781.json"