CVE-2022-50053
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:01:58
- Zuletzt bearbeitet 13.11.2025 18:15:11
In the Linux kernel, the following vulnerability has been resolved: iavf: Fix reset error handling Do not call iavf_close in iavf_reset_task error handling. Doing so can lead to double call of napi_disable, which can lead to deadlock there. Removin...
CVE-2022-50054
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:58
- Zuletzt bearbeitet 13.11.2025 18:15:33
In the Linux kernel, the following vulnerability has been resolved: iavf: Fix NULL pointer dereference in iavf_get_link_ksettings Fix possible NULL pointer dereference, due to freeing of adapter->vf_res in iavf_init_get_resources. Previous commit i...
CVE-2022-50052
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:52
- Zuletzt bearbeitet 13.11.2025 18:41:08
In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: avs: Fix potential buffer overflow by snprintf() snprintf() returns the would-be-filled size when the string overflows the given buffer size, hence using this value ma...
CVE-2022-50051
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:01:51
- Zuletzt bearbeitet 13.11.2025 18:41:00
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: debug: Fix potential buffer overflow by snprintf() snprintf() returns the would-be-filled size when the string overflows the given buffer size, hence using this value ma...
CVE-2022-50050
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:01:50
- Zuletzt bearbeitet 13.11.2025 18:40:54
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf() snprintf() returns the would-be-filled size when the string overflows the given buffer size, hence using this val...
CVE-2022-50049
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:01:49
- Zuletzt bearbeitet 13.11.2025 18:40:47
In the Linux kernel, the following vulnerability has been resolved: ASoC: DPCM: Don't pick up BE without substream When DPCM tries to add valid BE connections at dpcm_add_paths(), it doesn't check whether the picked BE actually supports for the giv...
CVE-2022-50047
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:48
- Zuletzt bearbeitet 13.11.2025 18:40:04
In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6060: prevent crash on an unused port If the port isn't a CPU port nor a user port, 'cpu_dp' is a null pointer and a crash happened on dereferencing it in mv88e6060_...
CVE-2022-50048
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:01:48
- Zuletzt bearbeitet 13.11.2025 18:40:39
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: possible module reference underflow in error path dst->ops is set on when nft_expr_clone() fails, but module refcount has not been bumped yet, therefore nft_e...
CVE-2022-50046
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:01:47
- Zuletzt bearbeitet 13.11.2025 18:39:27
In the Linux kernel, the following vulnerability has been resolved: net/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change() The issue happens on some error handling paths. When the function fails to grab the object `xprt`, it simply...
CVE-2022-50045
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:01:46
- Zuletzt bearbeitet 13.11.2025 18:39:20
In the Linux kernel, the following vulnerability has been resolved: powerpc/pci: Fix get_phb_number() locking The recent change to get_phb_number() causes a DEBUG_ATOMIC_SLEEP warning on some systems: BUG: sleeping function called from invalid c...