#VU111692 Input validation error in Linux kernel - CVE-2022-50101
Published: June 20, 2025 / Updated: June 21, 2025
Vulnerability identifier: #VU111692
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-50101
CWE-ID: CWE-20
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vt8623fb_set_par() function in drivers/video/fbdev/vt8623fb.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's repository.
External links
- https://git.kernel.org/stable/c/4a3cef1eaced13ba9b55381d46bfad937a3dac2c
- https://git.kernel.org/stable/c/52ad9bfeb8a0e62de30de6d39e8a49a72dd78150
- https://git.kernel.org/stable/c/73280a184aa2e1a625ce54ce761042955cc79cd0
- https://git.kernel.org/stable/c/b17caec5127bba6f90af92bcc85871df54548ac0
- https://git.kernel.org/stable/c/bd8269e57621e5b38cc0b4bd2fa02e85c9f2a441
- https://git.kernel.org/stable/c/c7a3f41e4b133d4dd25bc996b69039b19a34d69d
- https://git.kernel.org/stable/c/d71528ccdc7ae8d7500d414091d27805c51407a2
- https://git.kernel.org/stable/c/ec0754c60217248fa77cc9005d66b2b55200ac06
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.291
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.256
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.137
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.61
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.18
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.211
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0