CVE-2022-49610
- EPSS 0.07%
- Veröffentlicht 26.02.2025 07:01:36
- Zuletzt bearbeitet 23.10.2025 12:08:23
In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Prevent RSB underflow before vmenter On VMX, there are some balanced returns between the time the guest's SPEC_CTRL value is written, and the vmenter. Balanced returns (...
CVE-2022-49611
- EPSS 0.01%
- Veröffentlicht 26.02.2025 07:01:36
- Zuletzt bearbeitet 23.10.2025 12:08:28
In the Linux kernel, the following vulnerability has been resolved: x86/speculation: Fill RSB on vmexit for IBRS Prevent RSB underflow/poisoning attacks with RSB. While at it, add a bunch of comments to attempt to document the current state of tri...
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:36
- Zuletzt bearbeitet 06.03.2025 16:15:39
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2022-49615
- EPSS 0.13%
- Veröffentlicht 26.02.2025 07:01:36
- Zuletzt bearbeitet 01.10.2025 20:16:56
In the Linux kernel, the following vulnerability has been resolved: ASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error The initial settings will be written before the codec probe function. But, the rt711->component doesn't be assig...
CVE-2022-49595
- EPSS 0.01%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:53
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_probe_threshold. While reading sysctl_tcp_probe_threshold, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
CVE-2022-49596
- EPSS 0.06%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:53
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_min_snd_mss. While reading sysctl_tcp_min_snd_mss, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49597
- EPSS 0.07%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_base_mss. While reading sysctl_tcp_base_mss, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49598
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_mtu_probing. While reading sysctl_tcp_mtu_probing, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49601
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: tcp/dccp: Fix a data-race around sysctl_tcp_fwmark_accept. While reading sysctl_tcp_fwmark_accept, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
CVE-2022-49602
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:55
In the Linux kernel, the following vulnerability has been resolved: ip: Fix a data-race around sysctl_fwmark_reflect. While reading sysctl_fwmark_reflect, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.