CVE-2022-48924
- EPSS 0.02%
- Veröffentlicht 22.08.2024 02:15:08
- Zuletzt bearbeitet 27.08.2024 16:07:43
In the Linux kernel, the following vulnerability has been resolved: thermal: int340x: fix memory leak in int3400_notify() It is easy to hit the below memory leaks in my TigerLake platform: unreferenced object 0xffff927c8b91dbc0 (size 32): comm "...
CVE-2022-48925
- EPSS 0.03%
- Veröffentlicht 22.08.2024 02:15:08
- Zuletzt bearbeitet 23.08.2024 02:07:41
In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Do not change route.addr.src_addr outside state checks If the state is not idle then resolve_prepare_src() should immediately fail and no change to global state should ha...
CVE-2022-48920
- EPSS 0.02%
- Veröffentlicht 22.08.2024 02:15:06
- Zuletzt bearbeitet 12.09.2024 13:04:26
In the Linux kernel, the following vulnerability has been resolved: btrfs: get rid of warning on transaction commit when using flushoncommit When using the flushoncommit mount option, during almost every transaction commit we trigger a warning from...
CVE-2022-48905
- EPSS 0.02%
- Veröffentlicht 22.08.2024 02:15:05
- Zuletzt bearbeitet 12.09.2024 13:44:45
In the Linux kernel, the following vulnerability has been resolved: ibmvnic: free reset-work-item when flushing Fix a tiny memory leak when flushing the reset work queue.
CVE-2022-48908
- EPSS 0.04%
- Veröffentlicht 22.08.2024 02:15:05
- Zuletzt bearbeitet 01.10.2025 18:15:30
In the Linux kernel, the following vulnerability has been resolved: net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() During driver initialization, the pointer of card info, i.e. the variable 'ci' is required. However, the definition...
CVE-2022-48909
- EPSS 0.03%
- Veröffentlicht 22.08.2024 02:15:05
- Zuletzt bearbeitet 12.09.2024 13:36:11
In the Linux kernel, the following vulnerability has been resolved: net/smc: fix connection leak There's a potential leak issue under following execution sequence : smc_release smc_connect_work if (sk->sk_state == SMC_INIT) send_clc_conf...
CVE-2022-48910
- EPSS 0.02%
- Veröffentlicht 22.08.2024 02:15:05
- Zuletzt bearbeitet 08.11.2024 16:15:17
In the Linux kernel, the following vulnerability has been resolved: net: ipv6: ensure we call ipv6_mc_down() at most once There are two reasons for addrconf_notify() to be called with NETDEV_DOWN: either the network device is actually going down, o...
CVE-2022-48911
- EPSS 0.02%
- Veröffentlicht 22.08.2024 02:15:05
- Zuletzt bearbeitet 12.09.2024 13:24:58
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_queue: fix possible use-after-free Eric Dumazet says: The sock_hold() side seems suspect, because there is no guarantee that sk_refcnt is not already 0. On failu...
CVE-2022-48912
- EPSS 0.02%
- Veröffentlicht 22.08.2024 02:15:05
- Zuletzt bearbeitet 27.08.2024 16:12:47
In the Linux kernel, the following vulnerability has been resolved: netfilter: fix use-after-free in __nf_register_net_hook() We must not dereference @new_hooks after nf_hook_mutex has been released, because other threads might have freed our alloc...
CVE-2022-48914
- EPSS 0.02%
- Veröffentlicht 22.08.2024 02:15:05
- Zuletzt bearbeitet 12.09.2024 13:27:34
In the Linux kernel, the following vulnerability has been resolved: xen/netfront: destroy queues before real_num_tx_queues is zeroed xennet_destroy_queues() relies on info->netdev->real_num_tx_queues to delete queues. Since d7dac083414eb5bb99a6d2ed...