CVE-2023-52973
- EPSS 0.01%
- Veröffentlicht 27.03.2025 16:43:12
- Zuletzt bearbeitet 01.04.2025 15:40:21
In the Linux kernel, the following vulnerability has been resolved: vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF After a call to console_unlock() in vcs_read() the vc_data struct can be freed by vc_deallocate(). Because...
CVE-2022-49761
- EPSS 0.02%
- Veröffentlicht 27.03.2025 16:43:07
- Zuletzt bearbeitet 01.04.2025 15:40:43
In the Linux kernel, the following vulnerability has been resolved: btrfs: always report error in run_one_delayed_ref() Currently we have a btrfs_debug() for run_one_delayed_ref() failure, but if end users hit such problem, there will be no chance ...
CVE-2022-49757
- EPSS 0.02%
- Veröffentlicht 27.03.2025 16:43:04
- Zuletzt bearbeitet 01.10.2025 18:15:32
In the Linux kernel, the following vulnerability has been resolved: EDAC/highbank: Fix memory leak in highbank_mc_probe() When devres_open_group() fails, it returns -ENOMEM without freeing memory allocated by edac_mc_alloc(). Call edac_mc_free() o...
CVE-2022-49755
- EPSS 0.03%
- Veröffentlicht 27.03.2025 16:43:02
- Zuletzt bearbeitet 01.04.2025 15:40:57
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait While performing fast composition switch, there is a possibility that the process of ffs_ep0_write/ffs_ep0_read get into a...
CVE-2022-49750
- EPSS 0.01%
- Veröffentlicht 27.03.2025 16:42:59
- Zuletzt bearbeitet 01.10.2025 18:15:32
In the Linux kernel, the following vulnerability has been resolved: cpufreq: CPPC: Add u64 casts to avoid overflowing The fields of the _CPC object are unsigned 32-bits values. To avoid overflows while using _CPC's values, add 'u64' casts.
CVE-2022-49751
- EPSS 0.01%
- Veröffentlicht 27.03.2025 16:42:59
- Zuletzt bearbeitet 01.10.2025 20:17:09
In the Linux kernel, the following vulnerability has been resolved: w1: fix WARNING after calling w1_process() I got the following WARNING message while removing driver(ds2482): ------------[ cut here ]------------ do not call blocking ops when !T...
CVE-2022-49749
- EPSS 0.01%
- Veröffentlicht 27.03.2025 16:42:58
- Zuletzt bearbeitet 01.10.2025 18:15:32
In the Linux kernel, the following vulnerability has been resolved: i2c: designware: use casting of u64 in clock multiplication to avoid overflow In functions i2c_dw_scl_lcnt() and i2c_dw_scl_hcnt() may have overflow by depending on the values of t...
CVE-2022-49747
- EPSS 0.03%
- Veröffentlicht 27.03.2025 16:42:57
- Zuletzt bearbeitet 29.10.2025 17:18:00
In the Linux kernel, the following vulnerability has been resolved: erofs/zmap.c: Fix incorrect offset calculation Effective offset to add to length was being incorrectly calculated, which resulted in iomap->length being set to 0, triggering a WARN...
CVE-2022-49746
- EPSS 0.01%
- Veröffentlicht 27.03.2025 16:42:56
- Zuletzt bearbeitet 01.10.2025 18:15:31
In the Linux kernel, the following vulnerability has been resolved: dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init If the function sdma_load_context() fails, the sdma_desc will be freed, but the allocated desc->bd is forgot t...
CVE-2022-49743
- EPSS 0.02%
- Veröffentlicht 27.03.2025 16:42:54
- Zuletzt bearbeitet 19.01.2026 13:16:06
In the Linux kernel, the following vulnerability has been resolved: ovl: Use "buf" flexible array for memcpy() destination The "buf" flexible array needs to be the memcpy() destination to avoid false positive run-time warning from the recent FORTIF...