VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2022-50781

CVE-2022-50781

Description

In the Linux kernel, the following vulnerability has been resolved:

amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table()

In the PP_OD_EDIT_VDDC_CURVE case the "input_index" variable is capped at 2 but not checked for negative values so it results in an out of bounds read. This value comes from the user via sysfs.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, an array underflow in amdgpu/pm allows a user with sysfs access to read out-of-bounds memory.

Vulnerability

Description

In the Linux kernel, the amdgpu/pm driver's vega20_odn_edit_dpm_table() function has an out-of-bounds read vulnerability in the PP_OD_EDIT_VDDC_CURVE case. The input_index variable is capped at 2, but not checked for negative values, leading to an array underflow [1][2].

Exploitation

This value comes from the user via sysfs, meaning any user with local access to the sysfs interface can trigger the underflow [1][2]. No additional authentication is required beyond the ability to write to the sysfs attribute.

Impact

An attacker can read out-of-bounds kernel memory, which could leak sensitive information or cause a kernel panic, leading to denial of service.

Mitigation

The vulnerability is resolved in the Linux kernel stable branches; the fix adds a check for negative values. Users should update to the latest stable kernel version that includes the patch [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

6

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.