CVE-2022-49555
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:31
- Zuletzt bearbeitet 22.10.2025 17:31:42
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_qca: Use del_timer_sync() before freeing While looking at a crash report on a timer list being corrupted, which usually happens when a timer is freed while still act...
CVE-2022-49556
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:31
- Zuletzt bearbeitet 22.01.2026 20:55:08
In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak For some sev ioctl interfaces, the length parameter that is passed maybe less than or equal to SEV_FW_BLO...
CVE-2022-49557
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:31
- Zuletzt bearbeitet 22.10.2025 17:30:30
In the Linux kernel, the following vulnerability has been resolved: x86/fpu: KVM: Set the base guest FPU uABI size to sizeof(struct kvm_xsave) Set the starting uABI size of KVM's guest FPU to 'struct kvm_xsave', i.e. to KVM's historical uABI size. ...
CVE-2022-49558
- EPSS 0.05%
- Veröffentlicht 26.02.2025 07:01:31
- Zuletzt bearbeitet 22.10.2025 17:26:55
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: double hook unregistration in netns path __nft_release_hooks() is called from pre_netns exit path which unregisters the hooks, then the NETDEV_UNREGISTER even...
CVE-2022-49559
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:31
- Zuletzt bearbeitet 22.10.2025 17:26:31
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Drop WARNs that assert a triple fault never "escapes" from L2 Remove WARNs that sanity check that KVM never lets a triple fault for L2 escape and incorrectly end up in L1...
CVE-2022-49560
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:31
- Zuletzt bearbeitet 01.10.2025 20:16:45
In the Linux kernel, the following vulnerability has been resolved: exfat: check if cluster num is valid Syzbot reported slab-out-of-bounds read in exfat_clear_bitmap. This was triggered by reproducer calling truncute with size 0, which causes the ...
CVE-2022-49561
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:31
- Zuletzt bearbeitet 24.10.2025 15:50:35
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: re-fetch conntrack after insertion In case the conntrack is clashing, insertion can free skb->_nfct and set skb->_nfct to the already-confirmed entry. This w...
CVE-2022-49562
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:31
- Zuletzt bearbeitet 22.10.2025 19:10:00
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits Use the recently introduced __try_cmpxchg_user() to update guest PTE A/D bits instead of mapping the PTE into kernel...
CVE-2022-49542
- EPSS 0.02%
- Veröffentlicht 26.02.2025 07:01:30
- Zuletzt bearbeitet 01.10.2025 20:16:39
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() In an attempt to log message 0126 with LOG_TRACE_EVENT, the following hard lockup call trace hangs the system. ...
CVE-2022-49543
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:30
- Zuletzt bearbeitet 22.10.2025 17:15:36
In the Linux kernel, the following vulnerability has been resolved: ath11k: fix the warning of dev_wake in mhi_pm_disable_transition() When test device recovery with below command, it has warning in message as below. echo assert > /sys/kernel/debug...