CVE-2022-49594
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:34
- Zuletzt bearbeitet 01.10.2025 20:16:53
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_mtu_probe_floor. While reading sysctl_tcp_mtu_probe_floor, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
CVE-2022-49574
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:33
- Zuletzt bearbeitet 01.10.2025 20:16:49
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_recovery. While reading sysctl_tcp_recovery, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49575
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:33
- Zuletzt bearbeitet 01.10.2025 20:16:50
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_thin_linear_timeouts. While reading sysctl_tcp_thin_linear_timeouts, it can be changed concurrently. Thus, we need to add READ_ONCE() to its...
CVE-2022-49576
- EPSS 0.02%
- Veröffentlicht 26.02.2025 07:01:33
- Zuletzt bearbeitet 01.10.2025 20:16:50
In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix data-races around sysctl_fib_multipath_hash_fields. While reading sysctl_fib_multipath_hash_fields, it can be changed concurrently. Thus, we need to add READ_ONCE() to i...
CVE-2022-49577
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:33
- Zuletzt bearbeitet 01.10.2025 20:16:50
In the Linux kernel, the following vulnerability has been resolved: udp: Fix a data-race around sysctl_udp_l3mdev_accept. While reading sysctl_udp_l3mdev_accept, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
CVE-2022-49578
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:33
- Zuletzt bearbeitet 01.10.2025 20:16:50
In the Linux kernel, the following vulnerability has been resolved: ip: Fix data-races around sysctl_ip_prot_sock. sysctl_ip_prot_sock is accessed concurrently, and there is always a chance of data-race. So, all readers and writers need some basic...
CVE-2022-49579
- EPSS 0.02%
- Veröffentlicht 26.02.2025 07:01:33
- Zuletzt bearbeitet 01.10.2025 20:16:50
In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix data-races around sysctl_fib_multipath_hash_policy. While reading sysctl_fib_multipath_hash_policy, it can be changed concurrently. Thus, we need to add READ_ONCE() to i...
CVE-2022-49580
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:33
- Zuletzt bearbeitet 01.10.2025 20:16:51
In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix a data-race around sysctl_fib_multipath_use_neigh. While reading sysctl_fib_multipath_use_neigh, it can be changed concurrently. Thus, we need to add READ_ONCE() to its ...
CVE-2022-49581
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:33
- Zuletzt bearbeitet 22.10.2025 19:10:40
In the Linux kernel, the following vulnerability has been resolved: be2net: Fix buffer overflow in be_get_module_eeprom be_cmd_read_port_transceiver_data assumes that it is given a buffer that is at least PAGE_DATA_LEN long, or twice that if the mo...
CVE-2022-49582
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:33
- Zuletzt bearbeitet 01.10.2025 20:16:51
In the Linux kernel, the following vulnerability has been resolved: net: dsa: fix NULL pointer dereference in dsa_port_reset_vlan_filtering The "ds" iterator variable used in dsa_port_reset_vlan_filtering() -> dsa_switch_for_each_port() overwrites ...