CVE-2022-50024
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:01:27
- Zuletzt bearbeitet 13.11.2025 19:18:30
In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw-axi-dmac: do not print NULL LLI during error During debugging we have seen an issue where axi_chan_dump_lli() is passed a NULL LLI pointer which ends up causing an OO...
CVE-2022-50023
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:01:26
- Zuletzt bearbeitet 13.11.2025 19:46:45
In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw-axi-dmac: ignore interrupt if no descriptor If the channel has no descriptor and the interrupt is raised then the kernel will OOPS. Check the result of vchan_next_des...
CVE-2022-50021
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:25
- Zuletzt bearbeitet 13.11.2025 19:39:43
In the Linux kernel, the following vulnerability has been resolved: ext4: block range must be validated before use in ext4_mb_clear_bb() Block range to free is validated in ext4_free_blocks() using ext4_inode_block_valid() and then it's passed to e...
CVE-2022-50022
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:25
- Zuletzt bearbeitet 13.11.2025 19:46:54
In the Linux kernel, the following vulnerability has been resolved: drivers:md:fix a potential use-after-free bug In line 2884, "raid5_release_stripe(sh);" drops the reference to sh and may cause sh to be released. However, sh is subsequently used ...
CVE-2022-50020
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:24
- Zuletzt bearbeitet 23.12.2025 14:16:30
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid resizing to a partial cluster size This patch avoids an attempt to resize the filesystem to an unaligned cluster boundary. An online resize to a size that is not integ...
CVE-2022-50019
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:23
- Zuletzt bearbeitet 13.11.2025 19:32:07
In the Linux kernel, the following vulnerability has been resolved: tty: serial: Fix refcount leak bug in ucc_uart.c In soc_info(), of_find_node_by_type() will return a node pointer with refcount incremented. We should use of_node_put() when it is ...
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:22
- Zuletzt bearbeitet 18.06.2025 14:15:24
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2022-50017
- EPSS 0.01%
- Veröffentlicht 18.06.2025 11:01:21
- Zuletzt bearbeitet 13.11.2025 20:03:19
In the Linux kernel, the following vulnerability has been resolved: mips: cavium-octeon: Fix missing of_node_put() in octeon2_usb_clocks_start We should call of_node_put() for the reference 'uctl_node' returned by of_get_parent() which will increas...
CVE-2022-50016
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:20
- Zuletzt bearbeitet 14.11.2025 17:06:58
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot It is not yet clear, but it is possible to create a firmware so broken that it will send a reply message before...
CVE-2022-50015
- EPSS 0.02%
- Veröffentlicht 18.06.2025 11:01:19
- Zuletzt bearbeitet 14.11.2025 17:06:49
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot It is not yet clear, but it is possible to create a firmware so broken that it will send a reply message be...