0.0

CVE-2022-50716 - wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out

In the Linux kernel, the following vulnerability has been resolved: wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out syzkaller reported use-after-free with the stack trace like below [1]: [ 38.960489][ C3] ================================================================== [ 38.9…

πŸ“… Published: Dec. 24, 2025, midnight πŸ”„ Last Modified: Jan. 2, 2026, 3:04 p.m.

7.0

CVSS3.1

CVE-2022-50726 - net/mlx5: Fix possible use-after-free in async command interface

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix possible use-after-free in async command interface mlx5_cmd_cleanup_async_ctx should return only after all its callback handlers were completed. Before this patch, the below race between mlx5_cmd_cleanup_async_ctx a…

πŸ“… Published: Dec. 24, 2025, midnight πŸ”„ Last Modified: Dec. 29, 2025, 3:58 p.m.

0.0

CVE-2022-50739 - fs/ntfs3: Add null pointer check for inode operations

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Add null pointer check for inode operations This adds a sanity check for the i_op pointer of the inode which is returned after reading Root directory MFT record. We should check the i_op is valid before trying to create…

πŸ“… Published: Dec. 24, 2025, midnight πŸ”„ Last Modified: Jan. 2, 2026, 3:04 p.m.

0.0

CVE-2022-50745 - staging: media: tegra-video: fix device_node use after free

In the Linux kernel, the following vulnerability has been resolved: staging: media: tegra-video: fix device_node use after free At probe time this code path is followed: * tegra_csi_init * tegra_csi_channels_alloc * for_each_child_of_node(node, channel) -- iterates over channels …

πŸ“… Published: Dec. 24, 2025, midnight πŸ”„ Last Modified: Dec. 29, 2025, 3:58 p.m.

7.0

CVSS3.1

CVE-2022-50735 - wifi: mt76: do not run mt76u_status_worker if the device is not running

In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: do not run mt76u_status_worker if the device is not running Fix the following NULL pointer dereference avoiding to run mt76u_status_worker thread if the device is not running yet. KASAN: null-ptr-deref in range [0x00…

πŸ“… Published: Dec. 24, 2025, midnight πŸ”„ Last Modified: Jan. 2, 2026, 3:04 p.m.

0.0

CVE-2022-50729 - ksmbd: Fix resource leak in ksmbd_session_rpc_open()

In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix resource leak in ksmbd_session_rpc_open() When ksmbd_rpc_open() fails then it must call ksmbd_rpc_id_free() to undo the result of ksmbd_ipc_id_alloc().

πŸ“… Published: Dec. 24, 2025, midnight πŸ”„ Last Modified: Dec. 29, 2025, 3:58 p.m.

7.0

CVSS3.1

CVE-2022-50774 - crypto: qat - fix DMA transfer direction

In the Linux kernel, the following vulnerability has been resolved: crypto: qat - fix DMA transfer direction When CONFIG_DMA_API_DEBUG is selected, while running the crypto self test on the QAT crypto algorithms, the function add_dma_entry() reports a warning similar to the one below, saying that…

πŸ“… Published: Dec. 24, 2025, midnight πŸ”„ Last Modified: Dec. 29, 2025, 3:58 p.m.

7.0

CVSS3.1

CVE-2022-50717 - nvmet-tcp: add bounds check on Transfer Tag

In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds check on Transfer Tag ttag is used as an index to get cmd in nvmet_tcp_handle_h2c_data_pdu(), add a bounds check to avoid out-of-bounds access.

πŸ“… Published: Dec. 24, 2025, midnight πŸ”„ Last Modified: Jan. 2, 2026, 3:04 p.m.

0.0

CVE-2022-50765 - RISC-V: kexec: Fix memory leak of elf header buffer

In the Linux kernel, the following vulnerability has been resolved: RISC-V: kexec: Fix memory leak of elf header buffer This is reported by kmemleak detector: unreferenced object 0xff2000000403d000 (size 4096): comm "kexec", pid 146, jiffies 4294900633 (age 64.792s) hex dump (first 32 bytes)…

πŸ“… Published: Dec. 24, 2025, midnight πŸ”„ Last Modified: Dec. 29, 2025, 3:58 p.m.

5.5

CVSS3.1

CVE-2022-50755 - udf: Avoid double brelse() in udf_rename()

In the Linux kernel, the following vulnerability has been resolved: udf: Avoid double brelse() in udf_rename() syzbot reported a warning like below [1]: VFS: brelse: Trying to free free buffer WARNING: CPU: 2 PID: 7301 at fs/buffer.c:1145 __brelse+0x67/0xa0 ... Call Trace: <TASK> invalidate_bh…

πŸ“… Published: Dec. 24, 2025, midnight πŸ”„ Last Modified: Jan. 2, 2026, 3:04 p.m.
Total resulsts: 343921
Page 1906 of 34,393
Β« previous page Β» next page
Filters