CVE-2022-48821
- EPSS 0.05%
- Published 16.07.2024 12:15:06
- Last modified 25.09.2025 19:36:51
In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: avoid double fput() on failed usercopy If the copy back to userland fails for the FASTRPC_IOCTL_ALLOC_DMA_BUFF ioctl(), we shouldn't assume that 'buf->dmabuf' is sti...
CVE-2022-48823
- EPSS 0.02%
- Published 16.07.2024 12:15:06
- Last modified 25.09.2025 19:36:26
In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Fix refcount issue when LOGO is received during TMF Hung task call trace was seen during LOGO processing. [ 974.309060] [0000:00:00.0]:[qedf_eh_device_reset:868]: 1:0...
CVE-2022-48825
- EPSS 0.03%
- Published 16.07.2024 12:15:06
- Last modified 07.10.2025 19:59:39
In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Add stag_work to all the vports Call trace seen when creating NPIV ports, only 32 out of 64 show online. stag work was not initialized for vport, hence initialize the s...
CVE-2022-48827
- EPSS 0.02%
- Published 16.07.2024 12:15:06
- Last modified 25.09.2025 19:32:15
In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix the behavior of READ near OFFSET_MAX Dan Aloni reports: > Due to commit 8cfb9015280d ("NFS: Always provide aligned buffers to > the RPC read layers") on the client, a rea...
CVE-2022-48828
- EPSS 0.02%
- Published 16.07.2024 12:15:06
- Last modified 25.09.2025 19:31:42
In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix ia_size underflow iattr::ia_size is a loff_t, which is a signed 64-bit type. NFSv3 and NFSv4 both define file size as an unsigned 64-bit type. Thus there is a range of va...
CVE-2022-48829
- EPSS 0.02%
- Published 16.07.2024 12:15:06
- Last modified 07.10.2025 20:04:17
In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes iattr::ia_size is a loff_t, so these NFSv3 procedures must be careful to deal with incoming client size values that ar...
CVE-2022-48830
- EPSS 0.03%
- Published 16.07.2024 12:15:06
- Last modified 25.09.2025 19:22:00
In the Linux kernel, the following vulnerability has been resolved: can: isotp: fix potential CAN frame reception race in isotp_rcv() When receiving a CAN frame the current code logic does not consider concurrently receiving processes which do not ...
CVE-2022-48831
- EPSS 0.03%
- Published 16.07.2024 12:15:06
- Last modified 25.09.2025 20:08:29
In the Linux kernel, the following vulnerability has been resolved: ima: fix reference leak in asymmetric_verify() Don't leak a reference to the key if its algorithm is unknown.
CVE-2022-48832
- EPSS 0.03%
- Published 16.07.2024 12:15:06
- Last modified 07.10.2025 20:04:46
In the Linux kernel, the following vulnerability has been resolved: audit: don't deref the syscall args when checking the openat2 open_how::flags As reported by Jeff, dereferencing the openat2 syscall argument in audit_match_perm() to obtain the op...
CVE-2022-48807
- EPSS 0.02%
- Published 16.07.2024 12:15:05
- Last modified 25.09.2025 19:38:10
In the Linux kernel, the following vulnerability has been resolved: ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler Currently, the same handler is called for both a NETDEV_BONDING_INFO LAG unlink notification as for a NETDEV_UNREGISTER call. ...