5.5
CVE-2022-49098
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:00:47
- Zuletzt bearbeitet 14.10.2025 20:04:11
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
Drivers: hv: vmbus: Fix potential crash on module unload
The vmbus driver relies on the panic notifier infrastructure to perform
some operations when a panic event is detected. Since vmbus can be built
as module, it is required that the driver handles both registering and
unregistering such panic notifier callback.
After commit 74347a99e73a ("x86/Hyper-V: Unload vmbus channel in hv panic callback")
though, the panic notifier registration is done unconditionally in the module
initialization routine whereas the unregistering procedure is conditionally
guarded and executes only if HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE capability
is set.
This patch fixes that by unconditionally unregistering the panic notifier
in the module's exit routine as well.Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 4.19.118 < 4.19.238
Linux ≫ Linux Kernel Version >= 5.4.35 < 5.4.189
Linux ≫ Linux Kernel Version >= 5.6.7 < 5.7
Linux ≫ Linux Kernel Version >= 5.7.1 < 5.10.111
Linux ≫ Linux Kernel Version >= 5.11 < 5.15.34
Linux ≫ Linux Kernel Version >= 5.16 < 5.16.20
Linux ≫ Linux Kernel Version >= 5.17 < 5.17.3
Linux ≫ Linux Kernel Version5.7 Update-
Linux ≫ Linux Kernel Version5.7 Updaterc2
Linux ≫ Linux Kernel Version5.7 Updaterc3
Linux ≫ Linux Kernel Version5.7 Updaterc4
Linux ≫ Linux Kernel Version5.7 Updaterc5
Linux ≫ Linux Kernel Version5.7 Updaterc6
Linux ≫ Linux Kernel Version5.7 Updaterc7
Linux ≫ Linux Kernel Version5.18 Updaterc1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.133 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|