Vulnerabilities > Linux > Linux Kernel > 5.19
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2025-03-02 | CVE-2022-49733 | Unspecified vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC There is a small race window at snd_pcm_oss_sync() that is called from OSS PCM SNDCTL_DSP_SYNC ioctl; namely the function calls snd_pcm_oss_make_ready() at first, then takes the params_lock mutex for the rest. | 4.7 |
2025-02-26 | CVE-2022-49568 | NULL Pointer Dereference vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: KVM: Don't null dereference ops->destroy A KVM device cleanup happens in either of two callbacks: 1) destroy() which is called when the VM is being destroyed; 2) release() which is called when a device fd is closed. Most KVM devices use 1) but Book3s's interrupt controller KVM devices (XICS, XIVE, XIVE-native) use 2) as they need to close and reopen during the machine execution. | 5.5 |
2025-02-26 | CVE-2022-49569 | NULL Pointer Dereference vulnerability in Linux Kernel 5.19 In the Linux kernel, the following vulnerability has been resolved: spi: bcm2835: bcm2835_spi_handle_err(): fix NULL pointer deref for non DMA transfers In case a IRQ based transfer times out the bcm2835_spi_handle_err() function is called. | 5.5 |
2025-02-26 | CVE-2022-49570 | Integer Overflow or Wraparound vulnerability in Linux Kernel 5.19 In the Linux kernel, the following vulnerability has been resolved: gpio: gpio-xilinx: Fix integer overflow Current implementation is not able to configure more than 32 pins due to incorrect data type. | 5.5 |
2025-02-26 | CVE-2022-49571 | Race Condition vulnerability in Linux Kernel 5.19 In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_max_reordering. While reading sysctl_tcp_max_reordering, it can be changed concurrently. | 4.7 |
2025-02-26 | CVE-2022-49572 | Race Condition vulnerability in Linux Kernel 5.19 In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_slow_start_after_idle. While reading sysctl_tcp_slow_start_after_idle, it can be changed concurrently. | 4.7 |
2025-02-26 | CVE-2022-49573 | Race Condition vulnerability in Linux Kernel 5.19 In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_early_retrans. While reading sysctl_tcp_early_retrans, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader. | 4.7 |
2025-02-26 | CVE-2022-49574 | Race Condition vulnerability in Linux Kernel 5.19 In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_recovery. While reading sysctl_tcp_recovery, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers. | 4.7 |
2025-02-26 | CVE-2022-49575 | Race Condition vulnerability in Linux Kernel 5.19 In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_thin_linear_timeouts. While reading sysctl_tcp_thin_linear_timeouts, it can be changed concurrently. | 4.7 |
2025-02-26 | CVE-2022-49576 | Race Condition vulnerability in Linux Kernel 5.19 In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix data-races around sysctl_fib_multipath_hash_fields. While reading sysctl_fib_multipath_hash_fields, it can be changed concurrently. | 4.7 |