-
CVE-2022-50200
- EPSS 0.04%
- Published 18.06.2025 11:03:42
- Last modified 18.06.2025 13:47:40
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: selinux: Add boundary check in put_entry() Just like next_entry(), boundary check is necessary to prevent memory out-of-bound access.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
2dabe6a872a5744865372eb30ea51e8ccd21305a
Version
cee74f47a6baba0ac457e87687fdcf0abd599f0a
Status
affected
Version <
477722f31ad73aa779154d1d7e00825538389f76
Version
cee74f47a6baba0ac457e87687fdcf0abd599f0a
Status
affected
Version <
90bdf50ae70c5571a277b5601e4f5df210831e0a
Version
cee74f47a6baba0ac457e87687fdcf0abd599f0a
Status
affected
Version <
adbfdaacde18faf6cd4e490764045375266b3fbd
Version
cee74f47a6baba0ac457e87687fdcf0abd599f0a
Status
affected
Version <
7363a69d8ca8f0086f8e1196c8ddaf0e168614b1
Version
cee74f47a6baba0ac457e87687fdcf0abd599f0a
Status
affected
Version <
9605f50157cae00eb299e1189a6d708c84935ad8
Version
cee74f47a6baba0ac457e87687fdcf0abd599f0a
Status
affected
Version <
dedd558d9765b72c66e5a53948e9f5abc3ece1f6
Version
cee74f47a6baba0ac457e87687fdcf0abd599f0a
Status
affected
Version <
15ec76fb29be31df2bccb30fc09875274cba2776
Version
cee74f47a6baba0ac457e87687fdcf0abd599f0a
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
2.6.37
Status
affected
Version <
2.6.37
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.291
Status
unaffected
Version <=
4.19.*
Version
4.19.256
Status
unaffected
Version <=
5.4.*
Version
5.4.211
Status
unaffected
Version <=
5.10.*
Version
5.10.137
Status
unaffected
Version <=
5.15.*
Version
5.15.61
Status
unaffected
Version <=
5.18.*
Version
5.18.18
Status
unaffected
Version <=
5.19.*
Version
5.19.2
Status
unaffected
Version <=
*
Version
6.0
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.094 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|