5.5

CVSS3.1

CVE-2022-49726 - clocksource: hyper-v: unexport __init-annotated hv_init_clocksource()

In the Linux kernel, the following vulnerability has been resolved: clocksource: hyper-v: unexport __init-annotated hv_init_clocksource() EXPORT_SYMBOL and __init is a bad combination because the .init.text section is freed up after the initialization. Hence, modules cannot use symbols annotated โ€ฆ

๐Ÿ“… Published: Feb. 26, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 24, 2025, 6:52 p.m.

7.8

CVSS3.1

CVE-2022-49724 - tty: goldfish: Fix free_irq() on remove

In the Linux kernel, the following vulnerability has been resolved: tty: goldfish: Fix free_irq() on remove Pass the correct dev_id to free_irq() to fix this splat when the driver is unbound: WARNING: CPU: 0 PID: 30 at kernel/irq/manage.c:1895 free_irq Trying to free already-free IRQ 65 Call โ€ฆ

๐Ÿ“… Published: Feb. 26, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 24, 2025, 6:56 p.m.

5.5

CVSS3.1

CVE-2022-49709 - cfi: Fix __cfi_slowpath_diag RCU usage with cpuidle

In the Linux kernel, the following vulnerability has been resolved: cfi: Fix __cfi_slowpath_diag RCU usage with cpuidle RCU_NONIDLE usage during __cfi_slowpath_diag can result in an invalid RCU state in the cpuidle code path: WARNING: CPU: 1 PID: 0 at kernel/rcu/tree.c:613 rcu_eqs_enter+0xe4/0โ€ฆ

๐Ÿ“… Published: Feb. 26, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 24, 2025, 3:53 p.m.

5.5

CVSS3.1

CVE-2022-49691 - erspan: do not assume transport header is always set

In the Linux kernel, the following vulnerability has been resolved: erspan: do not assume transport header is always set Rewrite tests in ip6erspan_tunnel_xmit() and erspan_fb_xmit() to not assume transport header is set. syzbot reported: WARNING: CPU: 0 PID: 1350 at include/linux/skbuff.h:2911โ€ฆ

๐Ÿ“… Published: Feb. 26, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 24, 2025, 3:51 p.m.

5.5

CVSS3.1

CVE-2022-49681 - xtensa: xtfpga: Fix refcount leak bug in setup

In the Linux kernel, the following vulnerability has been resolved: xtensa: xtfpga: Fix refcount leak bug in setup In machine_setup(), of_find_compatible_node() will return a node pointer with refcount incremented. We should use of_node_put() when it is not used anymore.

๐Ÿ“… Published: Feb. 26, 2025, midnight ๐Ÿ”„ Last Modified: Dec. 23, 2025, 1:24 p.m.

4.7

CVSS3.1

CVE-2022-49599 - tcp: Fix data-races around sysctl_tcp_l3mdev_accept.

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_l3mdev_accept. While reading sysctl_tcp_l3mdev_accept, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.

๐Ÿ“… Published: Feb. 26, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 1, 2025, 8:16 p.m.

4.7

CVSS3.1

CVE-2022-49598 - tcp: Fix data-races around sysctl_tcp_mtu_probing.

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_mtu_probing. While reading sysctl_tcp_mtu_probing, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.

๐Ÿ“… Published: Feb. 26, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 1, 2025, 8:16 p.m.

4.7

CVSS3.1

CVE-2022-49593 - tcp: Fix a data-race around sysctl_tcp_probe_interval.

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_probe_interval. While reading sysctl_tcp_probe_interval, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

๐Ÿ“… Published: Feb. 26, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 1, 2025, 8:16 p.m.

4.7

CVSS3.1

CVE-2022-49585 - tcp: Fix data-races around sysctl_tcp_fastopen_blackhole_timeout.

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_fastopen_blackhole_timeout. While reading sysctl_tcp_fastopen_blackhole_timeout, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.

๐Ÿ“… Published: Feb. 26, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 1, 2025, 8:16 p.m.

5.5

CVSS3.1

CVE-2022-49570 - gpio: gpio-xilinx: Fix integer overflow

In the Linux kernel, the following vulnerability has been resolved: gpio: gpio-xilinx: Fix integer overflow Current implementation is not able to configure more than 32 pins due to incorrect data type. So type casting with unsigned long to avoid it.

๐Ÿ“… Published: Feb. 26, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 1, 2025, 8:16 p.m.
Total resulsts: 345729
Page 6226 of 34,573
ยซ previous page ยป next page
Filters