Количество 10
Количество 10
GHSA-5x8j-6m8p-fvgx
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails.

CVE-2022-50087
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails.

CVE-2022-50087
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails.

CVE-2022-50087
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails.
CVE-2022-50087
In the Linux kernel, the following vulnerability has been resolved: f ...
ELSA-2025-16919
ELSA-2025-16919: kernel security update (MODERATE)

SUSE-SU-2025:02334-1
Security update for the Linux Kernel

SUSE-SU-2025:02308-1
Security update for the Linux Kernel

SUSE-SU-2025:02537-1
Security update for the Linux Kernel

SUSE-SU-2025:02264-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-5x8j-6m8p-fvgx In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails. | 0% Низкий | 4 месяца назад | ||
![]() | CVE-2022-50087 In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails. | 0% Низкий | 4 месяца назад | |
![]() | CVE-2022-50087 In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails. | CVSS3: 7 | 0% Низкий | 4 месяца назад |
![]() | CVE-2022-50087 In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails. | 0% Низкий | 4 месяца назад | |
CVE-2022-50087 In the Linux kernel, the following vulnerability has been resolved: f ... | 0% Низкий | 4 месяца назад | ||
ELSA-2025-16919 ELSA-2025-16919: kernel security update (MODERATE) | 4 дня назад | |||
![]() | SUSE-SU-2025:02334-1 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:02308-1 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:02537-1 Security update for the Linux Kernel | 2 месяца назад | ||
![]() | SUSE-SU-2025:02264-1 Security update for the Linux Kernel | 3 месяца назад |
Уязвимостей на страницу