CVE-2022-50036

Source
https://cve.org/CVERecord?id=CVE-2022-50036
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50036.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50036
Downstream
Related
Published
2025-06-18T11:01:37.844Z
Modified
2026-04-03T13:14:51.765147681Z
Summary
drm/sun4i: dsi: Prevent underflow when computing packet sizes
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/sun4i: dsi: Prevent underflow when computing packet sizes

Currently, the packet overhead is subtracted using unsigned arithmetic. With a short sync pulse, this could underflow and wrap around to near the maximal u16 value. Fix this by using signed subtraction. The call to max() will correctly handle any negative numbers that are produced.

Apply the same fix to the other timings, even though those subtractions are less likely to underflow.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50036.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
133add5b5ad42b7bb5fcd59d681aef6475d08600
Fixed
a1e7908f78f5a7f53f8cd83c7dcdfec974c95f26
Fixed
98e28de472ef248352f04f87e29e634ebb0ec240
Fixed
fb837f5b83461624e525727a8f4add14b201147e
Fixed
82a1356a933d8443139f8886f11b63c974a09a67

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50036.json"