CVE-2022-50102
- EPSS 0.05%
- Veröffentlicht 18.06.2025 11:02:38
- Zuletzt bearbeitet 19.11.2025 13:43:16
In the Linux kernel, the following vulnerability has been resolved: video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() Since the user can control the arguments of the ioctl() from the user space, under special arguments that may re...
CVE-2022-50103
- EPSS 0.06%
- Veröffentlicht 18.06.2025 11:02:38
- Zuletzt bearbeitet 19.11.2025 13:29:49
In the Linux kernel, the following vulnerability has been resolved: sched, cpuset: Fix dl_cpu_busy() panic due to empty cs->cpus_allowed With cgroup v2, the cpuset's cpus_allowed mask can be empty indicating that the cpuset will just use the effect...
CVE-2022-50101
- EPSS 0.05%
- Veröffentlicht 18.06.2025 11:02:37
- Zuletzt bearbeitet 19.11.2025 13:53:28
In the Linux kernel, the following vulnerability has been resolved: video: fbdev: vt8623fb: Check the size of screen before memset_io() In the function vt8623fb_set_par(), the value of 'screen_size' is calculated by the user input. If the user prov...
CVE-2022-50099
- EPSS 0.05%
- Veröffentlicht 18.06.2025 11:02:36
- Zuletzt bearbeitet 19.11.2025 14:07:47
In the Linux kernel, the following vulnerability has been resolved: video: fbdev: arkfb: Check the size of screen before memset_io() In the function arkfb_set_par(), the value of 'screen_size' is calculated by the user input. If the user provides t...
CVE-2022-50097
- EPSS 0.05%
- Veröffentlicht 18.06.2025 11:02:34
- Zuletzt bearbeitet 19.11.2025 14:18:29
In the Linux kernel, the following vulnerability has been resolved: video: fbdev: s3fb: Check the size of screen before memset_io() In the function s3fb_set_par(), the value of 'screen_size' is calculated by the user input. If the user provides the...
CVE-2022-50094
- EPSS 0.04%
- Veröffentlicht 18.06.2025 11:02:32
- Zuletzt bearbeitet 18.11.2025 02:45:05
In the Linux kernel, the following vulnerability has been resolved: spmi: trace: fix stack-out-of-bound access in SPMI tracing functions trace_spmi_write_begin() and trace_spmi_read_end() both call memcpy() with a length of "len + 1". This leads t...
CVE-2022-50092
- EPSS 0.06%
- Veröffentlicht 18.06.2025 11:02:31
- Zuletzt bearbeitet 18.11.2025 02:50:03
In the Linux kernel, the following vulnerability has been resolved: dm thin: fix use-after-free crash in dm_sm_register_threshold_callback Fault inject on pool metadata device reports: BUG: KASAN: use-after-free in dm_pool_register_metadata_thres...
CVE-2022-50093
- EPSS 0.04%
- Veröffentlicht 18.06.2025 11:02:31
- Zuletzt bearbeitet 18.11.2025 02:44:34
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) KASAN reports: [ 4.668325][ T0] BUG: KASAN: wild-memory-access in dmar_parse_one_rhsa (arch/x86/include/asm/b...
CVE-2022-50087
- EPSS 0.06%
- Veröffentlicht 18.06.2025 11:02:28
- Zuletzt bearbeitet 18.11.2025 02:21:38
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL un...
CVE-2022-50086
- EPSS 0.05%
- Veröffentlicht 18.06.2025 11:02:27
- Zuletzt bearbeitet 18.11.2025 02:26:30
In the Linux kernel, the following vulnerability has been resolved: block: don't allow the same type rq_qos add more than once In our test of iocost, we encountered some list add/del corruptions of inner_walk list in ioc_timer_fn. The reason can b...