CVE-2022-49756
- EPSS 0.03%
- Veröffentlicht 27.03.2025 16:43:03
- Zuletzt bearbeitet 01.10.2025 18:15:32
In the Linux kernel, the following vulnerability has been resolved: phy: usb: sunplus: Fix potential null-ptr-deref in sp_usb_phy_probe() sp_usb_phy_probe() will call platform_get_resource_byname() that may fail and return NULL. devm_ioremap() will...
CVE-2022-49754
- EPSS 0.03%
- Veröffentlicht 27.03.2025 16:43:02
- Zuletzt bearbeitet 01.10.2025 20:17:10
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix a buffer overflow in mgmt_mesh_add() Smatch Warning: net/bluetooth/mgmt_util.c:375 mgmt_mesh_add() error: __memcpy() 'mesh_tx->param' too small (48 vs 50) Analysis:...
CVE-2022-49755
- EPSS 0.02%
- Veröffentlicht 27.03.2025 16:43:02
- Zuletzt bearbeitet 01.04.2025 15:40:57
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait While performing fast composition switch, there is a possibility that the process of ffs_ep0_write/ffs_ep0_read get into a...
CVE-2022-49753
- EPSS 0.04%
- Veröffentlicht 27.03.2025 16:43:01
- Zuletzt bearbeitet 01.04.2025 15:41:09
In the Linux kernel, the following vulnerability has been resolved: dmaengine: Fix double increment of client_count in dma_chan_get() The first time dma_chan_get() is called for a channel the channel client_count is incorrectly incremented twice fo...
CVE-2022-49752
- EPSS 0.02%
- Veröffentlicht 27.03.2025 16:43:00
- Zuletzt bearbeitet 01.10.2025 20:17:10
In the Linux kernel, the following vulnerability has been resolved: device property: fix of node refcount leak in fwnode_graph_get_next_endpoint() The 'parent' returned by fwnode_graph_get_port_parent() with refcount incremented when 'prev' is not ...
CVE-2022-49750
- EPSS 0.02%
- Veröffentlicht 27.03.2025 16:42:59
- Zuletzt bearbeitet 01.10.2025 18:15:32
In the Linux kernel, the following vulnerability has been resolved: cpufreq: CPPC: Add u64 casts to avoid overflowing The fields of the _CPC object are unsigned 32-bits values. To avoid overflows while using _CPC's values, add 'u64' casts.
CVE-2022-49751
- EPSS 0.02%
- Veröffentlicht 27.03.2025 16:42:59
- Zuletzt bearbeitet 01.10.2025 20:17:09
In the Linux kernel, the following vulnerability has been resolved: w1: fix WARNING after calling w1_process() I got the following WARNING message while removing driver(ds2482): ------------[ cut here ]------------ do not call blocking ops when !T...
CVE-2022-49749
- EPSS 0.02%
- Veröffentlicht 27.03.2025 16:42:58
- Zuletzt bearbeitet 01.10.2025 18:15:32
In the Linux kernel, the following vulnerability has been resolved: i2c: designware: use casting of u64 in clock multiplication to avoid overflow In functions i2c_dw_scl_lcnt() and i2c_dw_scl_hcnt() may have overflow by depending on the values of t...
CVE-2022-49747
- EPSS 0.02%
- Veröffentlicht 27.03.2025 16:42:57
- Zuletzt bearbeitet 29.10.2025 17:18:00
In the Linux kernel, the following vulnerability has been resolved: erofs/zmap.c: Fix incorrect offset calculation Effective offset to add to length was being incorrectly calculated, which resulted in iomap->length being set to 0, triggering a WARN...
CVE-2022-49748
- EPSS 0.02%
- Veröffentlicht 27.03.2025 16:42:57
- Zuletzt bearbeitet 01.10.2025 18:15:32
In the Linux kernel, the following vulnerability has been resolved: perf/x86/amd: fix potential integer overflow on shift of a int The left shift of int 32 bit integer constant 1 is evaluated using 32 bit arithmetic and then passed as a 64 bit func...