CVE-2022-50228
- EPSS 0.06%
- Veröffentlicht 18.06.2025 11:04:05
- Zuletzt bearbeitet 19.11.2025 12:57:50
In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0 Don't BUG/WARN on interrupt injection due to GIF being cleared, since it's trivial for userspace to force the situa...
CVE-2022-50224
- EPSS 0.07%
- Veröffentlicht 18.06.2025 11:03:57
- Zuletzt bearbeitet 19.11.2025 12:58:27
In the Linux kernel, the following vulnerability has been resolved: KVM: x86/mmu: Treat NX as a valid SPTE bit for NPT Treat the NX bit as valid when using NPT, as KVM will set the NX bit when the NX huge page mitigation is enabled (mindblowing) an...
CVE-2022-50222
- EPSS 0.06%
- Veröffentlicht 18.06.2025 11:03:56
- Zuletzt bearbeitet 19.11.2025 12:58:50
In the Linux kernel, the following vulnerability has been resolved: tty: vt: initialize unicode screen buffer syzbot reports kernel infoleak at vcs_read() [1], for buffer can be read immediately after resize operation. Initialize buffer using kzall...
CVE-2022-50220
- EPSS 0.06%
- Veröffentlicht 18.06.2025 11:03:55
- Zuletzt bearbeitet 19.11.2025 12:59:21
In the Linux kernel, the following vulnerability has been resolved: usbnet: Fix linkwatch use-after-free on disconnect usbnet uses the work usbnet_deferred_kevent() to perform tasks which may sleep. On disconnect, completion of the work was origin...
CVE-2022-50215
- EPSS 0.05%
- Veröffentlicht 18.06.2025 11:03:52
- Zuletzt bearbeitet 19.11.2025 12:59:55
In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Allow waiting for commands to complete on removed device When a SCSI device is removed while in active use, currently sg will immediately return -ENODEV on any attempt to...
CVE-2022-50213
- EPSS 0.06%
- Veröffentlicht 18.06.2025 11:03:50
- Zuletzt bearbeitet 19.11.2025 13:00:13
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not allow SET_ID to refer to another table When doing lookups for sets on the same batch by using its ID, a set from a different table can be used. Then, ...
CVE-2022-50210
- EPSS 0.05%
- Veröffentlicht 18.06.2025 11:03:49
- Zuletzt bearbeitet 19.11.2025 13:00:46
In the Linux kernel, the following vulnerability has been resolved: MIPS: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK When CONFIG_CPUMASK_OFFSTACK and CONFIG_DEBUG_PER_CPU_MAPS is selected, cpu_max_bits_warn() generates a runtime warning sim...
CVE-2022-50211
- EPSS 0.05%
- Veröffentlicht 18.06.2025 11:03:49
- Zuletzt bearbeitet 19.11.2025 13:00:36
In the Linux kernel, the following vulnerability has been resolved: md-raid10: fix KASAN warning There's a KASAN warning in raid10_remove_disk when running the lvm test lvconvert-raid-reshape.sh. We fix this warning by verifying that the value "num...
CVE-2022-50207
- EPSS 0.06%
- Veröffentlicht 18.06.2025 11:03:47
- Zuletzt bearbeitet 19.11.2025 12:45:31
In the Linux kernel, the following vulnerability has been resolved: ARM: bcm: Fix refcount leak in bcm_kona_smc_init of_find_matching_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. ...
CVE-2022-50206
- EPSS 0.05%
- Veröffentlicht 18.06.2025 11:03:46
- Zuletzt bearbeitet 19.11.2025 12:45:43
In the Linux kernel, the following vulnerability has been resolved: arm64: fix oops in concurrently setting insn_emulation sysctls emulation_proc_handler() changes table->data for proc_dointvec_minmax and can generate the following Oops if called c...