CVE-2022-49074
- EPSS 0.05%
- Veröffentlicht 26.02.2025 07:00:44
- Zuletzt bearbeitet 14.10.2025 20:31:47
In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3: Fix GICR_CTLR.RWP polling It turns out that our polling of RWP is totally wrong when checking for it in the redistributors, as we test the *distributor* bit index, ...
CVE-2022-49075
- EPSS 0.05%
- Veröffentlicht 26.02.2025 07:00:44
- Zuletzt bearbeitet 23.09.2025 18:32:06
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix qgroup reserve overflow the qgroup limit We use extent_changeset->bytes_changed in qgroup_reserve_data() to record how many bytes we set for EXTENT_QGROUP_RESERVED state...
CVE-2022-49076
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:00:44
- Zuletzt bearbeitet 24.03.2025 17:42:04
In the Linux kernel, the following vulnerability has been resolved: RDMA/hfi1: Fix use-after-free bug for mm struct Under certain conditions, such as MPI_Abort, the hfi1 cleanup code may represent the last reference held on the task mm. hfi1_mmu_rb...
CVE-2022-49058
- EPSS 0.07%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 01.10.2025 20:15:44
In the Linux kernel, the following vulnerability has been resolved: cifs: potential buffer overflow in handling symlinks Smatch printed a warning: arch/x86/crypto/poly1305_glue.c:198 poly1305_update_arch() error: __memcpy() 'dctx->buf' too small ...
CVE-2022-49059
- EPSS 0.02%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 24.03.2025 17:43:25
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: add flush_workqueue to prevent uaf Our detector found a concurrent use-after-free bug when detaching an NCI device. The main reason for this bug is the unexpected schedul...
CVE-2022-49060
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 01.10.2025 20:15:44
In the Linux kernel, the following vulnerability has been resolved: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() dev_name() was called with dev.parent as argument but without to NULL-check it before. Solve this by checking the pointe...
CVE-2022-49061
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 01.10.2025 20:15:44
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link When using a fixed-link, the altr_tse_pcs driver crashes due to null-pointer dereference as no phy_device i...
CVE-2022-49062
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 01.10.2025 20:15:45
In the Linux kernel, the following vulnerability has been resolved: cachefiles: Fix KASAN slab-out-of-bounds in cachefiles_set_volume_xattr Use the actual length of volume coherency data when setting the xattr to avoid the following KASAN report. ...
CVE-2022-49063
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 18.11.2025 15:08:43
In the Linux kernel, the following vulnerability has been resolved: ice: arfs: fix use-after-free when freeing @rx_cpu_rmap The CI testing bots triggered the following splat: [ 718.203054] BUG: KASAN: use-after-free in free_irq_cpu_rmap+0x53/0x80...
CVE-2022-49064
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:00:43
- Zuletzt bearbeitet 14.10.2025 19:04:27
In the Linux kernel, the following vulnerability has been resolved: cachefiles: unmark inode in use in error path Unmark inode in use if error encountered. If the in-use flag leakage occurs in cachefiles_open_file(), Cachefiles will complain "Inode...