Количество 12
Количество 12
GHSA-5x8j-6m8p-fvgx
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails.
CVE-2022-50087
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails.
CVE-2022-50087
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails.
CVE-2022-50087
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails.
CVE-2022-50087
In the Linux kernel, the following vulnerability has been resolved: f ...
RLSA-2025:16919
Moderate: kernel security update
ELSA-2025-16919
ELSA-2025-16919: kernel security update (MODERATE)
ELSA-2025-18281
ELSA-2025-18281: kernel security update (MODERATE)
SUSE-SU-2025:02334-1
Security update for the Linux Kernel
SUSE-SU-2025:02308-1
Security update for the Linux Kernel
SUSE-SU-2025:02537-1
Security update for the Linux Kernel
SUSE-SU-2025:02264-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-5x8j-6m8p-fvgx In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails. | 0% Низкий | 5 месяцев назад | ||
CVE-2022-50087 In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails. | 0% Низкий | 5 месяцев назад | ||
CVE-2022-50087 In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails. | CVSS3: 7 | 0% Низкий | 5 месяцев назад | |
CVE-2022-50087 In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails. | 0% Низкий | 5 месяцев назад | ||
CVE-2022-50087 In the Linux kernel, the following vulnerability has been resolved: f ... | 0% Низкий | 5 месяцев назад | ||
RLSA-2025:16919 Moderate: kernel security update | около 1 месяца назад | |||
ELSA-2025-16919 ELSA-2025-16919: kernel security update (MODERATE) | около 2 месяцев назад | |||
ELSA-2025-18281 ELSA-2025-18281: kernel security update (MODERATE) | 29 дней назад | |||
SUSE-SU-2025:02334-1 Security update for the Linux Kernel | 4 месяца назад | |||
SUSE-SU-2025:02308-1 Security update for the Linux Kernel | 4 месяца назад | |||
SUSE-SU-2025:02537-1 Security update for the Linux Kernel | 4 месяца назад | |||
SUSE-SU-2025:02264-1 Security update for the Linux Kernel | 4 месяца назад |
Уязвимостей на страницу