CVE-2022-50224
- EPSS 0.07%
- Veröffentlicht 18.06.2025 11:03:57
- Zuletzt bearbeitet 19.11.2025 12:58:27
In the Linux kernel, the following vulnerability has been resolved: KVM: x86/mmu: Treat NX as a valid SPTE bit for NPT Treat the NX bit as valid when using NPT, as KVM will set the NX bit when the NX huge page mitigation is enabled (mindblowing) an...
CVE-2022-50222
- EPSS 0.06%
- Veröffentlicht 18.06.2025 11:03:56
- Zuletzt bearbeitet 19.11.2025 12:58:50
In the Linux kernel, the following vulnerability has been resolved: tty: vt: initialize unicode screen buffer syzbot reports kernel infoleak at vcs_read() [1], for buffer can be read immediately after resize operation. Initialize buffer using kzall...
CVE-2022-50220
- EPSS 0.06%
- Veröffentlicht 18.06.2025 11:03:55
- Zuletzt bearbeitet 19.11.2025 12:59:21
In the Linux kernel, the following vulnerability has been resolved: usbnet: Fix linkwatch use-after-free on disconnect usbnet uses the work usbnet_deferred_kevent() to perform tasks which may sleep. On disconnect, completion of the work was origin...
CVE-2022-50218
- EPSS 0.06%
- Veröffentlicht 18.06.2025 11:03:54
- Zuletzt bearbeitet 19.11.2025 12:59:40
In the Linux kernel, the following vulnerability has been resolved: iio: light: isl29028: Fix the warning in isl29028_remove() The driver use the non-managed form of the register function in isl29028_remove(). To keep the release order as mirroring...
CVE-2022-50219
- EPSS 0.06%
- Veröffentlicht 18.06.2025 11:03:54
- Zuletzt bearbeitet 19.11.2025 12:59:32
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix KASAN use-after-free Read in compute_effective_progs Syzbot found a Use After Free bug in compute_effective_progs(). The reproducer creates a number of BPF links, and caus...
CVE-2022-50215
- EPSS 0.05%
- Veröffentlicht 18.06.2025 11:03:52
- Zuletzt bearbeitet 19.11.2025 12:59:55
In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Allow waiting for commands to complete on removed device When a SCSI device is removed while in active use, currently sg will immediately return -ENODEV on any attempt to...
CVE-2022-50214
- EPSS 0.06%
- Veröffentlicht 18.06.2025 11:03:51
- Zuletzt bearbeitet 19.11.2025 13:00:06
In the Linux kernel, the following vulnerability has been resolved: coresight: Clear the connection field properly coresight devices track their connections (output connections) and hold a reference to the fwnode. When a device goes away, we walk t...
CVE-2022-50212
- EPSS 0.06%
- Veröffentlicht 18.06.2025 11:03:50
- Zuletzt bearbeitet 19.11.2025 13:00:22
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not allow CHAIN_ID to refer to another table When doing lookups for chains on the same batch by using its ID, a chain from a different table can be used. I...
CVE-2022-50213
- EPSS 0.06%
- Veröffentlicht 18.06.2025 11:03:50
- Zuletzt bearbeitet 19.11.2025 13:00:13
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not allow SET_ID to refer to another table When doing lookups for sets on the same batch by using its ID, a set from a different table can be used. Then, ...
CVE-2022-50210
- EPSS 0.05%
- Veröffentlicht 18.06.2025 11:03:49
- Zuletzt bearbeitet 19.11.2025 13:00:46
In the Linux kernel, the following vulnerability has been resolved: MIPS: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK When CONFIG_CPUMASK_OFFSTACK and CONFIG_DEBUG_PER_CPU_MAPS is selected, cpu_max_bits_warn() generates a runtime warning sim...