#VU111693 Input validation error in Linux kernel - CVE-2022-50099
Published: June 20, 2025 / Updated: June 21, 2025
Vulnerability identifier: #VU111693
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-50099
CWE-ID: CWE-20
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the arkfb_set_par() function in drivers/video/fbdev/arkfb.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's repository.
External links
- https://git.kernel.org/stable/c/0701df594bc1d7ae55fed407fb65dd90a93f8a9c
- https://git.kernel.org/stable/c/09e733d6ac948e6fda4b16252e44ea46f98fc8b4
- https://git.kernel.org/stable/c/2ce61c39c2a0b8ec82f48e0f7136f0dac105ae75
- https://git.kernel.org/stable/c/352305ea50d682b8e081d826da53caf9e744d7d0
- https://git.kernel.org/stable/c/4a20c5510aa2c031a096a58deb356e91609781c9
- https://git.kernel.org/stable/c/53198b81930e567ad6b879812d88052a1e8ac79e
- https://git.kernel.org/stable/c/8bcb1a06e3091716b7cbebe0e91d1de9895068cd
- https://git.kernel.org/stable/c/96b550971c65d54d64728d8ba973487878a06454
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.291
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.256
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.137
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.61
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.18
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.211
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0