-
CVE-2022-50142
- EPSS 0.04%
- Veröffentlicht 18.06.2025 11:03:04
- Zuletzt bearbeitet 18.06.2025 13:47:40
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: intel_th: msu: Fix vmalloced buffers After commit f5ff79fddf0e ("dma-mapping: remove CONFIG_DMA_REMAP") there's a chance of DMA buffer getting allocated via vmalloc(), which messes up the mmapping code: > RIP: msc_mmap_fault [intel_th_msu] > Call Trace: > <TASK> > __do_fault > do_fault ... Fix this by accounting for vmalloc possibility.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
b5d924cb4c7b952eaa61622f14427723a78137a3
Version
ba39bd8306057fb343dfb75d93a76d824b625236
Status
affected
Version <
6ae2881c1d1fa0e33f4763b7c786f8ef05a9c828
Version
ba39bd8306057fb343dfb75d93a76d824b625236
Status
affected
Version <
566887bad7ff2297d6b3f9659c702ba075f3d62d
Version
ba39bd8306057fb343dfb75d93a76d824b625236
Status
affected
Version <
0ed72c6bc632cbf8d979ac60f982ff84b7bb610a
Version
ba39bd8306057fb343dfb75d93a76d824b625236
Status
affected
Version <
4914c50670b6a531e2cb17cd984cc565b4681312
Version
ba39bd8306057fb343dfb75d93a76d824b625236
Status
affected
Version <
ac12ad3ccf6d386e64a9d6a890595a2509d24edd
Version
ba39bd8306057fb343dfb75d93a76d824b625236
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.2
Status
affected
Version <
5.2
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.211
Status
unaffected
Version <=
5.10.*
Version
5.10.137
Status
unaffected
Version <=
5.15.*
Version
5.15.61
Status
unaffected
Version <=
5.18.*
Version
5.18.18
Status
unaffected
Version <=
5.19.*
Version
5.19.2
Status
unaffected
Version <=
*
Version
6.0
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.094 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|