Vulnerabilities > Linux > Linux Kernel > 5.3.13

DATE CVE VULNERABILITY TITLE RISK
2025-02-26 CVE-2022-49563 Integer Underflow (Wrap or Wraparound) vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: crypto: qat - add param check for RSA Reject requests with a source buffer that is bigger than the size of the key.
local
low complexity
linux CWE-191
5.5
2025-02-26 CVE-2022-49564 Integer Underflow (Wrap or Wraparound) vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: crypto: qat - add param check for DH Reject requests with a source buffer that is bigger than the size of the key.
local
low complexity
linux CWE-191
5.5
2025-02-26 CVE-2022-49566 Memory Leak vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: crypto: qat - fix memory leak in RSA When an RSA key represented in form 2 (as defined in PKCS #1 V2.1) is used, some components of the private key persist even after the TFM is released. Replace the explicit calls to free the buffers in qat_rsa_exit_tfm() with a call to qat_rsa_clear_ctx() which frees all buffers referenced in the TFM context.
local
low complexity
linux CWE-401
5.5
2025-02-26 CVE-2022-49567 Use of Uninitialized Resource vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix uninit-value in mpol_rebind_policy() mpol_set_nodemask()(mm/mempolicy.c) does not set up nodemask when pol->mode is MPOL_LOCAL.
local
low complexity
linux CWE-908
5.5
2025-02-26 CVE-2022-49568 NULL Pointer Dereference vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: KVM: Don't null dereference ops->destroy A KVM device cleanup happens in either of two callbacks: 1) destroy() which is called when the VM is being destroyed; 2) release() which is called when a device fd is closed. Most KVM devices use 1) but Book3s's interrupt controller KVM devices (XICS, XIVE, XIVE-native) use 2) as they need to close and reopen during the machine execution.
local
low complexity
linux CWE-476
5.5
2025-02-26 CVE-2022-49571 Race Condition vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_max_reordering. While reading sysctl_tcp_max_reordering, it can be changed concurrently.
local
high complexity
linux CWE-362
4.7
2025-02-26 CVE-2022-49572 Race Condition vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_slow_start_after_idle. While reading sysctl_tcp_slow_start_after_idle, it can be changed concurrently.
local
high complexity
linux CWE-362
4.7
2025-02-26 CVE-2022-49573 Race Condition vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_early_retrans. While reading sysctl_tcp_early_retrans, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
local
high complexity
linux CWE-362
4.7
2025-02-26 CVE-2022-49574 Race Condition vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_recovery. While reading sysctl_tcp_recovery, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
local
high complexity
linux CWE-362
4.7
2025-02-26 CVE-2022-49575 Race Condition vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_thin_linear_timeouts. While reading sysctl_tcp_thin_linear_timeouts, it can be changed concurrently.
local
high complexity
linux CWE-362
4.7