CVE-2022-49615
- EPSS 0.05%
- Veröffentlicht 26.02.2025 07:01:36
- Zuletzt bearbeitet 01.10.2025 20:16:56
In the Linux kernel, the following vulnerability has been resolved: ASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error The initial settings will be written before the codec probe function. But, the rt711->component doesn't be assig...
CVE-2022-49595
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:53
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_probe_threshold. While reading sysctl_tcp_probe_threshold, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
CVE-2022-49596
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:53
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_min_snd_mss. While reading sysctl_tcp_min_snd_mss, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49597
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_base_mss. While reading sysctl_tcp_base_mss, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49598
- EPSS 0.02%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_mtu_probing. While reading sysctl_tcp_mtu_probing, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49599
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_l3mdev_accept. While reading sysctl_tcp_l3mdev_accept, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49600
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: ip: Fix a data-race around sysctl_ip_autobind_reuse. While reading sysctl_ip_autobind_reuse, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
CVE-2022-49601
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: tcp/dccp: Fix a data-race around sysctl_tcp_fwmark_accept. While reading sysctl_tcp_fwmark_accept, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
CVE-2022-49602
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:55
In the Linux kernel, the following vulnerability has been resolved: ip: Fix a data-race around sysctl_fwmark_reflect. While reading sysctl_fwmark_reflect, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
CVE-2022-49603
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:55
In the Linux kernel, the following vulnerability has been resolved: ip: Fix data-races around sysctl_ip_fwd_update_priority. While reading sysctl_ip_fwd_update_priority, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reade...