6.0
CVE-2022-50216 - kernel: md-raid: destroy the bitmap after destroying the thread
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
3.3
CVE-2022-50150 - kernel: mwifiex: fix sleep in atomic context bugs caused by dev_coredumpv
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
5.5
CVE-2022-50081 - kernel: KVM: Unconditionally get a ref to /dev/kvm module when creating a VM
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
5.5
CVE-2022-49941 - kernel: tty: n_gsm: avoid call of sleeping functions from atomic context
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
5.5
CVE-2025-38030 - kernel: Revert "drm/amd: Keep display off while going into S4"
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
4.4
CVE-2025-38026 - kernel: x86/sev: Do not touch VMSA pages during SNP guest memory kdump
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
5.5
CVE-2022-50068 - drm/ttm: Fix dummy res NULL ptr deref bug
In the Linux kernel, the following vulnerability has been resolved: drm/ttm: Fix dummy res NULL ptr deref bug Check the bo->resource value before accessing the resource mem_type. v2: Fix commit description unwrapped warning <log snip> [ 40.191227][ T184] general protection fault, probably foโฆ
8.8
CVE-2025-46109 -
SQL Injection vulnerability in pbootCMS v.3.2.5 and v.3.2.10 allows a remote attacker to obtain sensitive information via a crafted GET request
5.5
CVE-2025-38070 - ASoC: sma1307: Add NULL check in sma1307_setting_loaded()
In the Linux kernel, the following vulnerability has been resolved: ASoC: sma1307: Add NULL check in sma1307_setting_loaded() All varibale allocated by kzalloc and devm_kzalloc could be NULL. Multiple pointer checks and their cleanup are added. This issue is found by our static analysis tool
5.5
CVE-2025-38055 - perf/x86/intel: Fix segfault with PEBS-via-PT with sample_freq
In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: Fix segfault with PEBS-via-PT with sample_freq Currently, using PEBS-via-PT with a sample frequency instead of a sample period, causes a segfault. For example: BUG: kernel NULL pointer dereference, address: โฆ