CVE-2022-49014
- EPSS 0.01%
- Veröffentlicht 21.10.2024 20:15:12
- Zuletzt bearbeitet 24.10.2024 18:29:23
In the Linux kernel, the following vulnerability has been resolved: net: tun: Fix use-after-free in tun_detach() syzbot reported use-after-free in tun_detach() [1]. This causes call trace like below: ==============================================...
CVE-2022-49015
- EPSS 0.01%
- Veröffentlicht 21.10.2024 20:15:12
- Zuletzt bearbeitet 24.10.2024 18:31:54
In the Linux kernel, the following vulnerability has been resolved: net: hsr: Fix potential use-after-free The skb is delivered to netif_rx() which may free it, after calling this, dereferencing skb may trigger use-after-free.
CVE-2022-48991
- EPSS 0.01%
- Veröffentlicht 21.10.2024 20:15:11
- Zuletzt bearbeitet 07.11.2024 19:36:33
In the Linux kernel, the following vulnerability has been resolved: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths Any codepath that zaps page table entries must invoke MMU notifiers to ensure that secondary MMUs (like KVM) don't ...
CVE-2022-48992
- EPSS 0.01%
- Veröffentlicht 21.10.2024 20:15:11
- Zuletzt bearbeitet 25.10.2024 15:51:38
In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-pcm: Add NULL check in BE reparenting Add NULL check in dpcm_be_reparent API, to handle kernel NULL pointer dereference error. The issue occurred in fuzzing test.
- EPSS 0.04%
- Veröffentlicht 21.10.2024 20:15:11
- Zuletzt bearbeitet 23.10.2024 09:15:02
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2022-48994
- EPSS 0.01%
- Veröffentlicht 21.10.2024 20:15:11
- Zuletzt bearbeitet 07.11.2024 13:52:43
In the Linux kernel, the following vulnerability has been resolved: ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG), indirect call targets are validated agai...
CVE-2022-48997
- EPSS 0.02%
- Veröffentlicht 21.10.2024 20:15:11
- Zuletzt bearbeitet 07.11.2024 17:07:08
In the Linux kernel, the following vulnerability has been resolved: char: tpm: Protect tpm_pm_suspend with locks Currently tpm transactions are executed unconditionally in tpm_pm_suspend() function, which may lead to races with other tpm accessors ...
CVE-2022-48999
- EPSS 0.02%
- Veröffentlicht 21.10.2024 20:15:11
- Zuletzt bearbeitet 31.10.2024 14:44:10
In the Linux kernel, the following vulnerability has been resolved: ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference Gwangun Jung reported a slab-out-of-bounds access in fib_nh_match: fib_nh_match+0xf98/0x11...
CVE-2022-49002
- EPSS 0.01%
- Veröffentlicht 21.10.2024 20:15:11
- Zuletzt bearbeitet 25.10.2024 14:24:12
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init() for_each_pci_dev() is implemented by pci_get_device(). The comment of pci_get_device() says that it will increase ...
CVE-2022-48981
- EPSS 0.02%
- Veröffentlicht 21.10.2024 20:15:10
- Zuletzt bearbeitet 25.10.2024 18:33:18
In the Linux kernel, the following vulnerability has been resolved: drm/shmem-helper: Remove errant put in error path drm_gem_shmem_mmap() doesn't own this reference, resulting in the GEM object getting prematurely freed leading to a later use-afte...