CVE-2022-49058
- EPSS 0.07%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 01.10.2025 20:15:44
In the Linux kernel, the following vulnerability has been resolved: cifs: potential buffer overflow in handling symlinks Smatch printed a warning: arch/x86/crypto/poly1305_glue.c:198 poly1305_update_arch() error: __memcpy() 'dctx->buf' too small ...
CVE-2022-49059
- EPSS 0.02%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 24.03.2025 17:43:25
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: add flush_workqueue to prevent uaf Our detector found a concurrent use-after-free bug when detaching an NCI device. The main reason for this bug is the unexpected schedul...
CVE-2022-49060
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 01.10.2025 20:15:44
In the Linux kernel, the following vulnerability has been resolved: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() dev_name() was called with dev.parent as argument but without to NULL-check it before. Solve this by checking the pointe...
CVE-2022-49061
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 01.10.2025 20:15:44
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link When using a fixed-link, the altr_tse_pcs driver crashes due to null-pointer dereference as no phy_device i...
CVE-2022-49062
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 01.10.2025 20:15:45
In the Linux kernel, the following vulnerability has been resolved: cachefiles: Fix KASAN slab-out-of-bounds in cachefiles_set_volume_xattr Use the actual length of volume coherency data when setting the xattr to avoid the following KASAN report. ...
CVE-2022-49063
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 18.11.2025 15:08:43
In the Linux kernel, the following vulnerability has been resolved: ice: arfs: fix use-after-free when freeing @rx_cpu_rmap The CI testing bots triggered the following splat: [ 718.203054] BUG: KASAN: use-after-free in free_irq_cpu_rmap+0x53/0x80...
CVE-2022-49064
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 14.10.2025 19:04:27
In the Linux kernel, the following vulnerability has been resolved: cachefiles: unmark inode in use in error path Unmark inode in use if error encountered. If the in-use flag leakage occurs in cachefiles_open_file(), Cachefiles will complain "Inode...
CVE-2022-49065
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 01.10.2025 20:15:45
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix the svc_deferred_event trace class Fix a NULL deref crash that occurs when an svc_rqst is deferred while the sunrpc tracing subsystem is enabled. svc_revisit() sets dr-...
CVE-2022-49066
- EPSS 0.05%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 14.10.2025 19:01:51
In the Linux kernel, the following vulnerability has been resolved: veth: Ensure eth header is in skb's linear part After feeding a decapsulated packet to a veth device with act_mirred, skb_headlen() may be 0. But veth_xmit() calls __dev_forward_sk...
CVE-2022-49067
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 14.10.2025 18:43:47
In the Linux kernel, the following vulnerability has been resolved: powerpc: Fix virt_addr_valid() for 64-bit Book3E & 32-bit mpe: On 64-bit Book3E vmalloc space starts at 0x8000000000000000. Because of the way __pa() works we have: __pa(0x80000...