CVE-2022-50511
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/10/2025
Last modified:
05/02/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
lib/fonts: fix undefined behavior in bit shift for get_default_font<br />
<br />
Shifting signed 32-bit value by 31 bits is undefined, so changing<br />
significant bit to unsigned. The UBSAN warning calltrace like below:<br />
<br />
UBSAN: shift-out-of-bounds in lib/fonts/fonts.c:139:20<br />
left shift of 1 by 31 places cannot be represented in type &#39;int&#39;<br />
<br />
dump_stack_lvl+0x7d/0xa5<br />
dump_stack+0x15/0x1b<br />
ubsan_epilogue+0xe/0x4e<br />
__ubsan_handle_shift_out_of_bounds+0x1e7/0x20c<br />
get_default_font+0x1c7/0x1f0<br />
fbcon_startup+0x347/0x3a0<br />
do_take_over_console+0xce/0x270<br />
do_fbcon_takeover+0xa1/0x170<br />
do_fb_registered+0x2a8/0x340<br />
fbcon_fb_registered+0x47/0xe0<br />
register_framebuffer+0x294/0x4a0<br />
__drm_fb_helper_initial_config_and_unlock+0x43c/0x880 [drm_kms_helper]<br />
drm_fb_helper_initial_config+0x52/0x80 [drm_kms_helper]<br />
drm_fbdev_client_hotplug+0x156/0x1b0 [drm_kms_helper]<br />
drm_fbdev_generic_setup+0xfc/0x290 [drm_kms_helper]<br />
bochs_pci_probe+0x6ca/0x772 [bochs]<br />
local_pci_probe+0x4d/0xb0<br />
pci_device_probe+0x119/0x320<br />
really_probe+0x181/0x550<br />
__driver_probe_device+0xc6/0x220<br />
driver_probe_device+0x32/0x100<br />
__driver_attach+0x195/0x200<br />
bus_for_each_dev+0xbb/0x120<br />
driver_attach+0x27/0x30<br />
bus_add_driver+0x22e/0x2f0<br />
driver_register+0xa9/0x190<br />
__pci_register_driver+0x90/0xa0<br />
bochs_pci_driver_init+0x52/0x1000 [bochs]<br />
do_one_initcall+0x76/0x430<br />
do_init_module+0x61/0x28a<br />
load_module+0x1f82/0x2e50<br />
__do_sys_finit_module+0xf8/0x190<br />
__x64_sys_finit_module+0x23/0x30<br />
do_syscall_64+0x58/0x80<br />
entry_SYSCALL_64_after_hwframe+0x63/0xcd<br />
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.23.1 (including) | 5.4.229 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.163 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.86 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1 (including) | 6.1.2 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.23:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.23:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.23:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.23:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.23:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.23:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.23:rc8:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.23:rc9:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/6fe888c4d2fb174408e4540bb2d5602b9f507f90
- https://git.kernel.org/stable/c/890d91b31f4874361e0df047f57d268a7021cb12
- https://git.kernel.org/stable/c/9c14a85e18a58c102ec223144b7edb5b345c1bea
- https://git.kernel.org/stable/c/c9a9aa02f0fa3318e0ae5774f404419a1b4759ca
- https://git.kernel.org/stable/c/e039929e36818507e90901edae87f6fa8bc81093
- https://git.kernel.org/stable/c/e83b47580a0738361772d6f24286adfdaba57e36



