CVE-2022-49566
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:32
- Zuletzt bearbeitet 01.10.2025 20:16:47
In the Linux kernel, the following vulnerability has been resolved: crypto: qat - fix memory leak in RSA When an RSA key represented in form 2 (as defined in PKCS #1 V2.1) is used, some components of the private key persist even after the TFM is re...
CVE-2022-49567
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:32
- Zuletzt bearbeitet 23.12.2025 14:16:16
In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix uninit-value in mpol_rebind_policy() mpol_set_nodemask()(mm/mempolicy.c) does not set up nodemask when pol->mode is MPOL_LOCAL. Check pol->mode before access pol...
CVE-2022-49568
- EPSS 0.09%
- Veröffentlicht 26.02.2025 07:01:32
- Zuletzt bearbeitet 01.10.2025 20:16:48
In the Linux kernel, the following vulnerability has been resolved: KVM: Don't null dereference ops->destroy A KVM device cleanup happens in either of two callbacks: 1) destroy() which is called when the VM is being destroyed; 2) release() which is...
CVE-2022-49569
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:32
- Zuletzt bearbeitet 01.10.2025 20:16:48
In the Linux kernel, the following vulnerability has been resolved: spi: bcm2835: bcm2835_spi_handle_err(): fix NULL pointer deref for non DMA transfers In case a IRQ based transfer times out the bcm2835_spi_handle_err() function is called. Since c...
CVE-2022-49570
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:32
- Zuletzt bearbeitet 01.10.2025 20:16:48
In the Linux kernel, the following vulnerability has been resolved: gpio: gpio-xilinx: Fix integer overflow Current implementation is not able to configure more than 32 pins due to incorrect data type. So type casting with unsigned long to avoid it...
CVE-2022-49571
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:32
- Zuletzt bearbeitet 01.10.2025 20:16:49
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_max_reordering. While reading sysctl_tcp_max_reordering, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49572
- EPSS 0.02%
- Veröffentlicht 26.02.2025 07:01:32
- Zuletzt bearbeitet 01.10.2025 20:16:49
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_slow_start_after_idle. While reading sysctl_tcp_slow_start_after_idle, it can be changed concurrently. Thus, we need to add READ_ONCE() to it...
CVE-2022-49573
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:32
- Zuletzt bearbeitet 01.10.2025 20:16:49
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_early_retrans. While reading sysctl_tcp_early_retrans, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
CVE-2022-49552
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:31
- Zuletzt bearbeitet 22.10.2025 17:14:05
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix combination of jit blinding and pointers to bpf subprogs. The combination of jit blinding and pointers to bpf subprogs causes: [ 36.989548] BUG: unable to handle page fa...
CVE-2022-49553
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:31
- Zuletzt bearbeitet 22.10.2025 17:36:08
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: validate BOOT sectors_per_clusters When the NTFS BOOT sectors_per_clusters field is > 0x80, it represents a shift value. Make sure that the shift value is not too large ...