CVE-2022-49613
- EPSS 0.14%
- Veröffentlicht 26.02.2025 07:01:36
- Zuletzt bearbeitet 23.10.2025 12:08:40
In the Linux kernel, the following vulnerability has been resolved: serial: 8250: Fix PM usage_count for console handover When console is enabled, univ8250_console_setup() calls serial8250_console_setup() before .dev is set to uart_port. Therefore,...
CVE-2022-49615
- EPSS 0.13%
- Veröffentlicht 26.02.2025 07:01:36
- Zuletzt bearbeitet 01.10.2025 20:16:56
In the Linux kernel, the following vulnerability has been resolved: ASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error The initial settings will be written before the codec probe function. But, the rt711->component doesn't be assig...
CVE-2022-49595
- EPSS 0.01%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:53
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_probe_threshold. While reading sysctl_tcp_probe_threshold, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
CVE-2022-49596
- EPSS 0.06%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:53
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_min_snd_mss. While reading sysctl_tcp_min_snd_mss, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49597
- EPSS 0.07%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_base_mss. While reading sysctl_tcp_base_mss, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49598
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_mtu_probing. While reading sysctl_tcp_mtu_probing, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49599
- EPSS 0.05%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_l3mdev_accept. While reading sysctl_tcp_l3mdev_accept, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49600
- EPSS 0.01%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: ip: Fix a data-race around sysctl_ip_autobind_reuse. While reading sysctl_ip_autobind_reuse, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
CVE-2022-49601
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: tcp/dccp: Fix a data-race around sysctl_tcp_fwmark_accept. While reading sysctl_tcp_fwmark_accept, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
CVE-2022-49602
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:55
In the Linux kernel, the following vulnerability has been resolved: ip: Fix a data-race around sysctl_fwmark_reflect. While reading sysctl_fwmark_reflect, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.