-
CVE-2022-50440
- EPSS 0.04%
- Published 01.10.2025 12:15:36
- Last modified 02.10.2025 19:12:17
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate the box size for the snooped cursor Invalid userspace dma surface copies could potentially overflow the memcpy from the surface to the snooped image leading to crashes. To fix it the dimensions of the copybox have to be validated against the expected size of the snooped cursor.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
ee8d31836cbe7c26e207bfa0a4a726f0a25cfcf6
Version
2ac863719e518ae1a8f328849e64ea26a222f079
Status
affected
Version <
50d177f90b63ea4138560e500d92be5e4c928186
Version
2ac863719e518ae1a8f328849e64ea26a222f079
Status
affected
Version <
6b4e70a428b5a11f56db94047b68e144529fe512
Version
2ac863719e518ae1a8f328849e64ea26a222f079
Status
affected
Version <
94b283341f9f3f0ed56a360533766377a01540e0
Version
2ac863719e518ae1a8f328849e64ea26a222f079
Status
affected
Version <
439cbbc1519547f9a7b483f0de33b556ebfec901
Version
2ac863719e518ae1a8f328849e64ea26a222f079
Status
affected
Version <
6948e570f54f2044dd4da444b10471373a047eeb
Version
2ac863719e518ae1a8f328849e64ea26a222f079
Status
affected
Version <
4d54d11b49860686331c58a00f733b16a93edfc4
Version
2ac863719e518ae1a8f328849e64ea26a222f079
Status
affected
Version <
622d527decaac0eb65512acada935a0fdc1d0202
Version
2ac863719e518ae1a8f328849e64ea26a222f079
Status
affected
Version <
4cf949c7fafe21e085a4ee386bb2dade9067316e
Version
2ac863719e518ae1a8f328849e64ea26a222f079
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
3.2
Status
affected
Version <
3.2
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.87
Status
unaffected
Version <=
6.0.*
Version
6.0.18
Status
unaffected
Version <=
6.1.*
Version
6.1.4
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.129 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|