Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm/dp: fix memory corruption with too many bridges Add the missing sanity check on the bridge counter to avoid corrupting data beyond the fixed-sized bridge array in case there are ever more than eight bridges. Patchwork: https://patchwork.freedesktop.org/patch/502664/

PUBLISHED Reserved 2025-10-07 | Published 2025-10-07 | Updated 2025-10-07 | Assigner Linux

Product status

Default status
unaffected

8a3b4c17f863cde8e8743edd8faffe916c49b960 before b312fcab461bd9484c61409007a6fe059f9c2074
affected

8a3b4c17f863cde8e8743edd8faffe916c49b960 before 74466e46e7543c7f74f1502181e9ba93f7521374
affected

Default status
affected

5.17
affected

Any version before 5.17
unaffected

6.0.7
unaffected

6.1
unaffected

References

git.kernel.org/...c/b312fcab461bd9484c61409007a6fe059f9c2074

git.kernel.org/...c/74466e46e7543c7f74f1502181e9ba93f7521374

cve.org (CVE-2022-50526)

nvd.nist.gov (CVE-2022-50526)

Download JSON