CVE-2022-50649Linux vulnerability

6 documents5 sources
Severity
N/A
No vector
EPSS
0.0%
top 85.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() ADP5061_CHG_STATUS_1_CHG_STATUS is masked with 0x07, which means a length of 8, but adp5061_chg_type array size is 4, may end up reading 4 elements beyond the end of the adp5061_chg_type[] array.

Affected Packages4 packages

Linuxlinux/linux_kernel4.19.04.19.262+5
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linuxfe8e81b7e899968690e5e87c25727178921b5b9a24a0be36e9a21f63de2e6088607e689e59ec15f4+7
debiandebian/linux< linux 6.0.3-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-2qfw-gff9-vfpr: In the Linux kernel, the following vulnerability has been resolved: power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() ADP50612025-12-09
OSV
CVE-2022-50649: In the Linux kernel, the following vulnerability has been resolved: power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() ADP5061_C2025-12-09
OSV
power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type()2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type()2025-12-09
Debian
CVE-2022-50649: linux - In the Linux kernel, the following vulnerability has been resolved: power: supp...2022