{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T03:15:43.971","vulnerabilities":[{"cve":{"id":"CVE-2022-50781","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-12-24T13:16:04.943","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\namdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table()\n\nIn the PP_OD_EDIT_VDDC_CURVE case the \"input_index\" variable is capped at\n2 but not checked for negative values so it results in an out of bounds\nread.  This value comes from the user via sysfs."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/4d3dc0de9c46d9f73be6bac026e40b893e37ea21","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/8084bd0a64e278314b733993f388d83a86aa1183","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/85273b4a7076ed5328c8ace02234e4e7e10972d5","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/a03625ad11b50429930f4c491d6c97e70f2ba89a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/d27252b5706e51188aed7647126e44dcf9e940c1","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/f289a38df0da4cfe4b50d04b1b9c3bc646fecd57","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}