{"uuid": "7276c453-c211-4b45-8ce6-43fb00d971b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-39189", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14902", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-39189\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.\n\ud83d\udccf Published: 2022-09-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T16:13:17.022Z\n\ud83d\udd17 References:\n1. https://bugs.chromium.org/p/project-zero/issues/detail?id=2309\n2. https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17\n3. https://github.com/torvalds/linux/commit/6cd88243c7e03845a450795e134b488fc2afb736\n4. https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736\n5. https://security.netapp.com/advisory/ntap-20230214-0007/\n6. https://www.debian.org/security/2023/dsa-5480\n7. https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", "creation_timestamp": "2025-05-05T16:19:50.000000Z"}