CVE-2022-49607
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:36
- Zuletzt bearbeitet 01.10.2025 20:16:56
In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix data race between perf_event_set_output() and perf_mmap_close() Yang Jihing reported a race between perf_event_set_output() and perf_mmap_close(): CPU1 CPU2 ...
CVE-2022-49608
- EPSS 0.02%
- Veröffentlicht 26.02.2025 07:01:36
- Zuletzt bearbeitet 01.10.2025 20:16:56
In the Linux kernel, the following vulnerability has been resolved: pinctrl: ralink: Check for null return of devm_kcalloc Because of the possible failure of the allocation, data->domains might be NULL pointer and will cause the dereference of the ...
CVE-2022-49609
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:36
- Zuletzt bearbeitet 01.10.2025 20:16:56
In the Linux kernel, the following vulnerability has been resolved: power/reset: arm-versatile: Fix refcount leak in versatile_reboot_probe of_find_matching_node_and_match() returns a node pointer with refcount incremented, we should use of_node_pu...
CVE-2022-49611
- EPSS 0.01%
- Veröffentlicht 26.02.2025 07:01:36
- Zuletzt bearbeitet 23.10.2025 12:08:28
In the Linux kernel, the following vulnerability has been resolved: x86/speculation: Fill RSB on vmexit for IBRS Prevent RSB underflow/poisoning attacks with RSB. While at it, add a bunch of comments to attempt to document the current state of tri...
CVE-2022-49595
- EPSS 0.01%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:53
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_probe_threshold. While reading sysctl_tcp_probe_threshold, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
CVE-2022-49596
- EPSS 0.06%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:53
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_min_snd_mss. While reading sysctl_tcp_min_snd_mss, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49597
- EPSS 0.07%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_base_mss. While reading sysctl_tcp_base_mss, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49598
- EPSS 0.04%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_mtu_probing. While reading sysctl_tcp_mtu_probing, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVE-2022-49601
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:54
In the Linux kernel, the following vulnerability has been resolved: tcp/dccp: Fix a data-race around sysctl_tcp_fwmark_accept. While reading sysctl_tcp_fwmark_accept, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
CVE-2022-49602
- EPSS 0.03%
- Veröffentlicht 26.02.2025 07:01:35
- Zuletzt bearbeitet 01.10.2025 20:16:55
In the Linux kernel, the following vulnerability has been resolved: ip: Fix a data-race around sysctl_fwmark_reflect. While reading sysctl_fwmark_reflect, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.