CVE-2022-49011
- EPSS 0.01%
- Veröffentlicht 21.10.2024 20:15:12
- Zuletzt bearbeitet 24.10.2024 19:01:47
In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish usin...
CVE-2022-49013
- EPSS 0.12%
- Veröffentlicht 21.10.2024 20:15:12
- Zuletzt bearbeitet 24.10.2024 19:09:30
In the Linux kernel, the following vulnerability has been resolved: sctp: fix memory leak in sctp_stream_outq_migrate() When sctp_stream_outq_migrate() is called to release stream out resources, the memory pointed to by prio_head in stream out is n...
CVE-2022-49014
- EPSS 0.01%
- Veröffentlicht 21.10.2024 20:15:12
- Zuletzt bearbeitet 24.10.2024 18:29:23
In the Linux kernel, the following vulnerability has been resolved: net: tun: Fix use-after-free in tun_detach() syzbot reported use-after-free in tun_detach() [1]. This causes call trace like below: ==============================================...
CVE-2022-49015
- EPSS 0.01%
- Veröffentlicht 21.10.2024 20:15:12
- Zuletzt bearbeitet 24.10.2024 18:31:54
In the Linux kernel, the following vulnerability has been resolved: net: hsr: Fix potential use-after-free The skb is delivered to netif_rx() which may free it, after calling this, dereferencing skb may trigger use-after-free.
CVE-2022-49017
- EPSS 0.02%
- Veröffentlicht 21.10.2024 20:15:12
- Zuletzt bearbeitet 24.10.2024 18:36:13
In the Linux kernel, the following vulnerability has been resolved: tipc: re-fetch skb cb after tipc_msg_validate As the call trace shows, the original skb was freed in tipc_msg_validate(), and dereferencing the old skb cb would cause an use-after-...
CVE-2022-48991
- EPSS 0.01%
- Veröffentlicht 21.10.2024 20:15:11
- Zuletzt bearbeitet 07.11.2024 19:36:33
In the Linux kernel, the following vulnerability has been resolved: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths Any codepath that zaps page table entries must invoke MMU notifiers to ensure that secondary MMUs (like KVM) don't ...
CVE-2022-48992
- EPSS 0.01%
- Veröffentlicht 21.10.2024 20:15:11
- Zuletzt bearbeitet 25.10.2024 15:51:38
In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-pcm: Add NULL check in BE reparenting Add NULL check in dpcm_be_reparent API, to handle kernel NULL pointer dereference error. The issue occurred in fuzzing test.
CVE-2022-48994
- EPSS 0.01%
- Veröffentlicht 21.10.2024 20:15:11
- Zuletzt bearbeitet 07.11.2024 13:52:43
In the Linux kernel, the following vulnerability has been resolved: ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG), indirect call targets are validated agai...
CVE-2022-48995
- EPSS 0.02%
- Veröffentlicht 21.10.2024 20:15:11
- Zuletzt bearbeitet 25.10.2024 15:52:51
In the Linux kernel, the following vulnerability has been resolved: Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send() There is a kmemleak when test the raydium_i2c_ts with bpf mock device: unreferenced object 0xffff88812d3675a0 (size...
CVE-2022-48997
- EPSS 0.02%
- Veröffentlicht 21.10.2024 20:15:11
- Zuletzt bearbeitet 07.11.2024 17:07:08
In the Linux kernel, the following vulnerability has been resolved: char: tpm: Protect tpm_pm_suspend with locks Currently tpm transactions are executed unconditionally in tpm_pm_suspend() function, which may lead to races with other tpm accessors ...