Latest CVE Feed
-
5.5
MEDIUMCVE-2023-1583
A NULL pointer dereference was found in io_file_bitmap_get in io_uring/filetable.c in the io_uring sub-component in the Linux Kernel. When fixed files are unregistered, some context information (file_alloc_{start,end} and alloc_hint) is not cleared. A sub... Read more
Affected Products : linux_kernel- EPSS Score: %0.01
- Published: Mar. 24, 2023
- Modified: Feb. 20, 2025
-
5.5
MEDIUMCVE-2023-0597
A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some impor... Read more
Affected Products : linux_kernel- EPSS Score: %0.02
- Published: Feb. 23, 2023
- Modified: Mar. 12, 2025
-
5.5
MEDIUMCVE-2022-49930
In the Linux kernel, the following vulnerability has been resolved: RDMA/hns: Fix NULL pointer problem in free_mr_init() Lock grab occurs in a concurrent scenario, resulting in stepping on a NULL pointer. It should be init mutex_init() first before use... Read more
Affected Products : linux_kernel- Published: May. 01, 2025
- Modified: May. 07, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2022-49901
In the Linux kernel, the following vulnerability has been resolved: blk-mq: Fix kmemleak in blk_mq_init_allocated_queue There is a kmemleak caused by modprobe null_blk.ko unreferenced object 0xffff8881acb1f000 (size 1024): comm "modprobe", pid 836, j... Read more
Affected Products : linux_kernel- Published: May. 01, 2025
- Modified: May. 07, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2022-49875
In the Linux kernel, the following vulnerability has been resolved: bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE When using bpftool to pin {PROG, MAP, LINK} without FILE, segmentation fault will occur. The reson is that ... Read more
Affected Products : linux_kernel- Published: May. 01, 2025
- Modified: May. 07, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2022-49874
In the Linux kernel, the following vulnerability has been resolved: HID: hyperv: fix possible memory leak in mousevsc_probe() If hid_add_device() returns error, it should call hid_destroy_device() to free hid_dev which is allocated in hid_allocate_devic... Read more
Affected Products : linux_kernel- Published: May. 01, 2025
- Modified: May. 07, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2022-49861
In the Linux kernel, the following vulnerability has been resolved: dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() A clk_prepare_enable() call in the probe is not balanced by a corresponding clk_disable_unprepare() in the remove functio... Read more
Affected Products : linux_kernel- Published: May. 01, 2025
- Modified: May. 07, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2022-49758
In the Linux kernel, the following vulnerability has been resolved: reset: uniphier-glue: Fix possible null-ptr-deref It will cause null-ptr-deref when resource_size(res) invoked, if platform_get_resource() returns NULL.... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2022-49751
In the Linux kernel, the following vulnerability has been resolved: w1: fix WARNING after calling w1_process() I got the following WARNING message while removing driver(ds2482): ------------[ cut here ]------------ do not call blocking ops when !TASK_R... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 14, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2022-49749
In the Linux kernel, the following vulnerability has been resolved: i2c: designware: use casting of u64 in clock multiplication to avoid overflow In functions i2c_dw_scl_lcnt() and i2c_dw_scl_hcnt() may have overflow by depending on the values of the gi... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 14, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2022-49727
In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg When len >= INT_MAX - transhdrlen, ulen = len + transhdrlen will be overflow. To fix, we can follow what udpv6 does and subtract th... Read more
Affected Products : linux_kernel- Published: Feb. 26, 2025
- Modified: Mar. 07, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2024-56703
In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix soft lockups in fib6_select_path under high next hop churn Soft lockups have been observed on a cluster of Linux-based edge routers located in a highly dynamic environment. Us... Read more
Affected Products : linux_kernel- Published: Dec. 28, 2024
- Modified: Feb. 02, 2025
-
5.5
MEDIUMCVE-2022-49482
In the Linux kernel, the following vulnerability has been resolved: ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when done.... Read more
Affected Products : linux_kernel- Published: Feb. 26, 2025
- Modified: Mar. 17, 2025
-
5.5
MEDIUMCVE-2022-49473
In the Linux kernel, the following vulnerability has been resolved: ASoC: ti: j721e-evm: Fix refcount leak in j721e_soc_probe_* of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not needed anymor... Read more
Affected Products : linux_kernel- Published: Feb. 26, 2025
- Modified: Mar. 17, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2022-49441
In the Linux kernel, the following vulnerability has been resolved: tty: fix deadlock caused by calling printk() under tty_port->lock pty_write() invokes kmalloc() which may invoke a normal printk() to print failure message. This can cause a deadlock i... Read more
Affected Products : linux_kernel- Published: Feb. 26, 2025
- Modified: Mar. 17, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2022-49568
In the Linux kernel, the following vulnerability has been resolved: KVM: Don't null dereference ops->destroy A KVM device cleanup happens in either of two callbacks: 1) destroy() which is called when the VM is being destroyed; 2) release() which is call... Read more
Affected Products : linux_kernel- Published: Feb. 26, 2025
- Modified: Feb. 26, 2025
-
5.5
MEDIUMCVE-2022-49335
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/cs: make commands with 0 chunks illegal behaviour. Submitting a cs with 0 chunks, causes an oops later, found trying to execute the wrong userspace driver. MESA_LOADER_DRIVE... Read more
Affected Products : linux_kernel- Published: Feb. 26, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2022-49309
In the Linux kernel, the following vulnerability has been resolved: drivers: staging: rtl8723bs: Fix deadlock in rtw_surveydone_event_callback() There is a deadlock in rtw_surveydone_event_callback(), which is shown below: (Thread 1) ... Read more
Affected Products : linux_kernel- Published: Feb. 26, 2025
- Modified: May. 02, 2025
- Vuln Type: Race Condition
-
5.5
MEDIUMCVE-2022-49224
In the Linux kernel, the following vulnerability has been resolved: power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init kobject_init_and_add() takes reference even when it fails. According to the doc of kobject_init_and_add(): If this fun... Read more
Affected Products : linux_kernel- Published: Feb. 26, 2025
- Modified: Mar. 18, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2022-49212
In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init The reference counting issue happens in several error handling paths on a refcounted object "nc->dmac". In these pa... Read more
Affected Products : linux_kernel- Published: Feb. 26, 2025
- Modified: Mar. 18, 2025
- Vuln Type: Memory Corruption