CVE-2022-49752
- EPSS 0.02%
- Veröffentlicht 27.03.2025 16:43:00
- Zuletzt bearbeitet 01.10.2025 20:17:10
In the Linux kernel, the following vulnerability has been resolved: device property: fix of node refcount leak in fwnode_graph_get_next_endpoint() The 'parent' returned by fwnode_graph_get_port_parent() with refcount incremented when 'prev' is not ...
CVE-2022-49750
- EPSS 0.03%
- Veröffentlicht 27.03.2025 16:42:59
- Zuletzt bearbeitet 01.10.2025 18:15:32
In the Linux kernel, the following vulnerability has been resolved: cpufreq: CPPC: Add u64 casts to avoid overflowing The fields of the _CPC object are unsigned 32-bits values. To avoid overflows while using _CPC's values, add 'u64' casts.
CVE-2022-49751
- EPSS 0.06%
- Veröffentlicht 27.03.2025 16:42:59
- Zuletzt bearbeitet 01.10.2025 20:17:09
In the Linux kernel, the following vulnerability has been resolved: w1: fix WARNING after calling w1_process() I got the following WARNING message while removing driver(ds2482): ------------[ cut here ]------------ do not call blocking ops when !T...
CVE-2022-49749
- EPSS 0.03%
- Veröffentlicht 27.03.2025 16:42:58
- Zuletzt bearbeitet 01.10.2025 18:15:32
In the Linux kernel, the following vulnerability has been resolved: i2c: designware: use casting of u64 in clock multiplication to avoid overflow In functions i2c_dw_scl_lcnt() and i2c_dw_scl_hcnt() may have overflow by depending on the values of t...
CVE-2022-49747
- EPSS 0.02%
- Veröffentlicht 27.03.2025 16:42:57
- Zuletzt bearbeitet 29.10.2025 17:18:00
In the Linux kernel, the following vulnerability has been resolved: erofs/zmap.c: Fix incorrect offset calculation Effective offset to add to length was being incorrectly calculated, which resulted in iomap->length being set to 0, triggering a WARN...
CVE-2022-49748
- EPSS 0.03%
- Veröffentlicht 27.03.2025 16:42:57
- Zuletzt bearbeitet 01.10.2025 18:15:32
In the Linux kernel, the following vulnerability has been resolved: perf/x86/amd: fix potential integer overflow on shift of a int The left shift of int 32 bit integer constant 1 is evaluated using 32 bit arithmetic and then passed as a 64 bit func...
CVE-2022-49746
- EPSS 0.05%
- Veröffentlicht 27.03.2025 16:42:56
- Zuletzt bearbeitet 01.10.2025 18:15:31
In the Linux kernel, the following vulnerability has been resolved: dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init If the function sdma_load_context() fails, the sdma_desc will be freed, but the allocated desc->bd is forgot t...
CVE-2022-49745
- EPSS 0.07%
- Veröffentlicht 27.03.2025 16:42:55
- Zuletzt bearbeitet 30.10.2025 16:41:06
In the Linux kernel, the following vulnerability has been resolved: fpga: m10bmc-sec: Fix probe rollback Handle probe error rollbacks properly to avoid leaks.
CVE-2022-49743
- EPSS 0.05%
- Veröffentlicht 27.03.2025 16:42:54
- Zuletzt bearbeitet 19.01.2026 13:16:06
In the Linux kernel, the following vulnerability has been resolved: ovl: Use "buf" flexible array for memcpy() destination The "buf" flexible array needs to be the memcpy() destination to avoid false positive run-time warning from the recent FORTIF...
CVE-2022-49744
- EPSS 0.07%
- Veröffentlicht 27.03.2025 16:42:54
- Zuletzt bearbeitet 30.10.2025 16:46:02
In the Linux kernel, the following vulnerability has been resolved: mm/uffd: fix pte marker when fork() without fork event Patch series "mm: Fixes on pte markers". Patch 1 resolves the syzkiller report from Pengfei. Patch 2 further harden pte mar...