CVE-2022-50075
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:02:18
- Zuletzt bearbeitet 17.11.2025 19:31:11
In the Linux kernel, the following vulnerability has been resolved: tracing/eprobes: Have event probes be consistent with kprobes and uprobes Currently, if a symbol "@" is attempted to be used with an event probe (eprobes), it will cause a NULL poi...
CVE-2022-50073
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:02:17
- Zuletzt bearbeitet 17.11.2025 17:59:44
In the Linux kernel, the following vulnerability has been resolved: net: tap: NULL pointer derefence in dev_parse_header_protocol when skb->dev is null Fixes a NULL pointer derefence bug triggered from tap driver. When tap_get_user calls virtio_net...
CVE-2022-50072
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:02:16
- Zuletzt bearbeitet 17.11.2025 18:00:37
In the Linux kernel, the following vulnerability has been resolved: NFSv4/pnfs: Fix a use-after-free bug in open If someone cancels the open RPC call, then we must not try to free either the open slot or the layoutget operation arguments, since the...
CVE-2022-50070
- EPSS 0.03%
- Veröffentlicht 18.06.2025 11:02:15
- Zuletzt bearbeitet 17.11.2025 18:18:56
In the Linux kernel, the following vulnerability has been resolved: mptcp: do not queue data on closed subflows Dipanjan reported a syzbot splat at close time: WARNING: CPU: 1 PID: 10818 at net/ipv4/af_inet.c:153 inet_sock_destruct+0x6d0/0x8e0 net...
CVE-2022-50071
- EPSS 0.03%
- Veröffentlicht 18.06.2025 11:02:15
- Zuletzt bearbeitet 17.11.2025 18:15:43
In the Linux kernel, the following vulnerability has been resolved: mptcp: move subflow cleanup in mptcp_destroy_common() If the mptcp socket creation fails due to a CGROUP_INET_SOCK_CREATE eBPF program, the MPTCP protocol ends-up leaking all the s...
CVE-2022-50069
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:02:14
- Zuletzt bearbeitet 17.11.2025 18:19:32
In the Linux kernel, the following vulnerability has been resolved: BPF: Fix potential bad pointer dereference in bpf_sys_bpf() The bpf_sys_bpf() helper function allows an eBPF program to load another eBPF program from within the kernel. In this ca...
CVE-2022-50067
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:02:13
- Zuletzt bearbeitet 17.11.2025 18:25:37
In the Linux kernel, the following vulnerability has been resolved: btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() In btrfs_relocate_block_group(), the rc is allocated. Then btrfs_relocate_block_group() calls relo...
CVE-2022-50068
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:02:13
- Zuletzt bearbeitet 17.11.2025 18:20:15
In the Linux kernel, the following vulnerability has been resolved: drm/ttm: Fix dummy res NULL ptr deref bug Check the bo->resource value before accessing the resource mem_type. v2: Fix commit description unwrapped warning <log snip> [ 40.1912...
CVE-2022-50066
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:02:12
- Zuletzt bearbeitet 17.11.2025 18:27:21
In the Linux kernel, the following vulnerability has been resolved: net: atlantic: fix aq_vec index out of range error The final update statement of the for loop exceeds the array range, the dereference of self->aq_vec[i] is not checked and then le...
CVE-2022-50064
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:02:11
- Zuletzt bearbeitet 13.11.2025 18:26:46
In the Linux kernel, the following vulnerability has been resolved: virtio-blk: Avoid use-after-free on suspend/resume hctx->user_data is set to vq in virtblk_init_hctx(). However, vq is freed on suspend and reallocated on resume. So, hctx->user_...