Latest CVE Feed
-
0.0
NACVE-2023-52933
In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix handling and sanity checking of xattr_ids count A Sysbot [1] corrupted filesystem exposes two flaws in the handling and sanity checking of the xattr_ids count in the files... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Mar. 28, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2023-52932
In the Linux kernel, the following vulnerability has been resolved: mm/swapfile: add cond_resched() in get_swap_pages() The softlockup still occurs in get_swap_pages() under memory pressure. 64 CPU cores, 64GB memory, and 28 zram devices, the disksize ... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Denial of Service
-
7.8
HIGHCVE-2023-52931
In the Linux kernel, the following vulnerability has been resolved: drm/i915: Avoid potential vm use-after-free Adding the vm to the vm_xa table makes it visible to userspace, which could try to race with us to close the vm. So we need to take our extr... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2023-52930
In the Linux kernel, the following vulnerability has been resolved: drm/i915: Fix potential bit_17 double-free A userspace with multiple threads racing I915_GEM_SET_TILING to set the tiling to I915_TILING_NONE could trigger a double free of the bit_17 b... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-52929
In the Linux kernel, the following vulnerability has been resolved: nvmem: core: fix cleanup after dev_set_name() If dev_set_name() fails, we leak nvmem->wp_gpio as the cleanup does not put this. While a minimal fix for this would be to add the gpiod_pu... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Mar. 28, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-52928
In the Linux kernel, the following vulnerability has been resolved: bpf: Skip invalid kfunc call in backtrack_insn The verifier skips invalid kfunc call in check_kfunc_call(), which would be captured in fixup_kfunc_call() if such insn is not eliminated ... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Mar. 28, 2025
- Vuln Type: Misconfiguration
-
7.8
HIGHCVE-2022-49761
In the Linux kernel, the following vulnerability has been resolved: btrfs: always report error in run_one_delayed_ref() Currently we have a btrfs_debug() for run_one_delayed_ref() failure, but if end users hit such problem, there will be no chance that ... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Information Disclosure
-
0.0
NACVE-2022-49760
In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix PTE marker handling in hugetlb_change_protection() Patch series "mm/hugetlb: uffd-wp fixes for hugetlb_change_protection()". Playing with virtio-mem and background snap... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Mar. 28, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2022-49759
In the Linux kernel, the following vulnerability has been resolved: VMCI: Use threaded irqs instead of tasklets The vmci_dispatch_dgs() tasklet function calls vmci_read_data() which uses wait_event() resulting in invalid sleep in an atomic context (and ... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Race Condition
-
5.5
MEDIUMCVE-2022-49758
In the Linux kernel, the following vulnerability has been resolved: reset: uniphier-glue: Fix possible null-ptr-deref It will cause null-ptr-deref when resource_size(res) invoked, if platform_get_resource() returns NULL.... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2022-49757
In the Linux kernel, the following vulnerability has been resolved: EDAC/highbank: Fix memory leak in highbank_mc_probe() When devres_open_group() fails, it returns -ENOMEM without freeing memory allocated by edac_mc_alloc(). Call edac_mc_free() on the... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2022-49756
In the Linux kernel, the following vulnerability has been resolved: phy: usb: sunplus: Fix potential null-ptr-deref in sp_usb_phy_probe() sp_usb_phy_probe() will call platform_get_resource_byname() that may fail and return NULL. devm_ioremap() will use ... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 14, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2022-49755
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait While performing fast composition switch, there is a possibility that the process of ffs_ep0_write/ffs_ep0_read get into a race... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 01, 2025
- Vuln Type: Race Condition
-
7.8
HIGHCVE-2022-49754
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix a buffer overflow in mgmt_mesh_add() Smatch Warning: net/bluetooth/mgmt_util.c:375 mgmt_mesh_add() error: __memcpy() 'mesh_tx->param' too small (48 vs 50) Analysis: 'me... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 14, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2022-49753
In the Linux kernel, the following vulnerability has been resolved: dmaengine: Fix double increment of client_count in dma_chan_get() The first time dma_chan_get() is called for a channel the channel client_count is incorrectly incremented twice for pub... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 01, 2025
-
5.5
MEDIUMCVE-2022-49752
In the Linux kernel, the following vulnerability has been resolved: device property: fix of node refcount leak in fwnode_graph_get_next_endpoint() The 'parent' returned by fwnode_graph_get_port_parent() with refcount incremented when 'prev' is not NULL,... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 14, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2022-49751
In the Linux kernel, the following vulnerability has been resolved: w1: fix WARNING after calling w1_process() I got the following WARNING message while removing driver(ds2482): ------------[ cut here ]------------ do not call blocking ops when !TASK_R... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 14, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2022-49750
In the Linux kernel, the following vulnerability has been resolved: cpufreq: CPPC: Add u64 casts to avoid overflowing The fields of the _CPC object are unsigned 32-bits values. To avoid overflows while using _CPC's values, add 'u64' casts.... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 14, 2025
-
5.5
MEDIUMCVE-2022-49749
In the Linux kernel, the following vulnerability has been resolved: i2c: designware: use casting of u64 in clock multiplication to avoid overflow In functions i2c_dw_scl_lcnt() and i2c_dw_scl_hcnt() may have overflow by depending on the values of the gi... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 14, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2022-49748
In the Linux kernel, the following vulnerability has been resolved: perf/x86/amd: fix potential integer overflow on shift of a int The left shift of int 32 bit integer constant 1 is evaluated using 32 bit arithmetic and then passed as a 64 bit function ... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Apr. 14, 2025
- Vuln Type: Memory Corruption