CVE-2022-50027
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:01:30
- Zuletzt bearbeitet 13.11.2025 19:29:41
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE There is no corresponding free routine if lpfc_sli4_issue_wqe fails to issue the CMF WQE in lpfc_issue_cmf_sync_w...
CVE-2022-50026
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:01:29
- Zuletzt bearbeitet 13.11.2025 19:29:33
In the Linux kernel, the following vulnerability has been resolved: habanalabs/gaudi: fix shift out of bounds When validating NIC queues, queue offset calculation must be performed only for NIC queues.
CVE-2022-50025
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:28
- Zuletzt bearbeitet 13.11.2025 19:28:44
In the Linux kernel, the following vulnerability has been resolved: cxl: Fix a memory leak in an error handling path A bitmap_zalloc() must be balanced by a corresponding bitmap_free() in the error handling path of afu_allocate_irqs().
CVE-2022-50024
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:01:27
- Zuletzt bearbeitet 13.11.2025 19:18:30
In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw-axi-dmac: do not print NULL LLI during error During debugging we have seen an issue where axi_chan_dump_lli() is passed a NULL LLI pointer which ends up causing an OO...
CVE-2022-50023
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:01:26
- Zuletzt bearbeitet 13.11.2025 19:46:45
In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw-axi-dmac: ignore interrupt if no descriptor If the channel has no descriptor and the interrupt is raised then the kernel will OOPS. Check the result of vchan_next_des...
CVE-2022-50021
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:25
- Zuletzt bearbeitet 13.11.2025 19:39:43
In the Linux kernel, the following vulnerability has been resolved: ext4: block range must be validated before use in ext4_mb_clear_bb() Block range to free is validated in ext4_free_blocks() using ext4_inode_block_valid() and then it's passed to e...
CVE-2022-50022
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:25
- Zuletzt bearbeitet 13.11.2025 19:46:54
In the Linux kernel, the following vulnerability has been resolved: drivers:md:fix a potential use-after-free bug In line 2884, "raid5_release_stripe(sh);" drops the reference to sh and may cause sh to be released. However, sh is subsequently used ...
CVE-2022-50020
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:24
- Zuletzt bearbeitet 23.12.2025 14:16:30
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid resizing to a partial cluster size This patch avoids an attempt to resize the filesystem to an unaligned cluster boundary. An online resize to a size that is not integ...
CVE-2022-50019
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:23
- Zuletzt bearbeitet 13.11.2025 19:32:07
In the Linux kernel, the following vulnerability has been resolved: tty: serial: Fix refcount leak bug in ucc_uart.c In soc_info(), of_find_node_by_type() will return a node pointer with refcount incremented. We should use of_node_put() when it is ...
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:22
- Zuletzt bearbeitet 18.06.2025 14:15:24
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.