
CVE-2022-49116 – Bluetooth: use memset avoid memory leaks
https://notcve.org/view.php?id=CVE-2022-49116
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: Bluetooth: use memset avoid memory leaks Use memset to initialize structs to prevent memory leaks in l2cap_ecred_connect • https://git.kernel.org/stable/c/9567d54e70ff58c2695c2cc2e53c86c67551d3e6 •

CVE-2022-49115 – PCI: endpoint: Fix misused goto label
https://notcve.org/view.php?id=CVE-2022-49115
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Fix misused goto label Fix a misused goto label jump since that can result in a memory leak. • https://git.kernel.org/stable/c/5ebf3fc59bd20d17df3ba26159787d13cf20d362 •

CVE-2022-49114 – scsi: libfc: Fix use after free in fc_exch_abts_resp()
https://notcve.org/view.php?id=CVE-2022-49114
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: scsi: libfc: Fix use after free in fc_exch_abts_resp() fc_exch_release(ep) will decrease the ep's reference count. When the reference count reaches zero, it is freed. But ep is still used in the following code, which will lead to a use after free. Return after the fc_exch_release() call to avoid use after free. • https://git.kernel.org/stable/c/4a131d4ea8b581ac9b01d3a72754db4848be3232 •

CVE-2022-49113 – powerpc/secvar: fix refcount leak in format_show()
https://notcve.org/view.php?id=CVE-2022-49113
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: powerpc/secvar: fix refcount leak in format_show() Refcount leak will happen when format_show returns failure in multiple cases. Unified management of of_node_put can fix this problem. • https://git.kernel.org/stable/c/02222bf4f0a27f6eba66d1f597cdb5daadd51829 •

CVE-2022-49112 – mt76: fix monitor mode crash with sdio driver
https://notcve.org/view.php?id=CVE-2022-49112
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: mt76: fix monitor mode crash with sdio driver mt7921s driver may receive frames with fragment buffers. If there is a CTS packet received in monitor mode, the payload is 10 bytes only and need 6 bytes header padding after RXD buffer. However, only RXD in the first linear buffer, if we pull buffer size RXD-size+6 bytes with skb_pull(), that would trigger "BUG_ON(skb->len < skb->data_len)" in __skb_pull(). To avoid the nonlinear buffer issue, ... • https://git.kernel.org/stable/c/7bc04215a66b60e198aecaee8418f6d79fa19faa •

CVE-2022-49111 – Bluetooth: Fix use after free in hci_send_acl
https://notcve.org/view.php?id=CVE-2022-49111
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix use after free in hci_send_acl This fixes the following trace caused by receiving HCI_EV_DISCONN_PHY_LINK_COMPLETE which does call hci_conn_del without first checking if conn->type is in fact AMP_LINK and in case it is do properly cleanup upper layers with hci_disconn_cfm: ================================================================== BUG: KASAN: use-after-free in hci_send_acl+0xaba/0xc50 Read of size 8 at addr ffff88800e... • https://git.kernel.org/stable/c/c41de54b0a963e59e4dd04c029a4a6d73f45ef9c •

CVE-2022-49110 – netfilter: conntrack: revisit gc autotuning
https://notcve.org/view.php?id=CVE-2022-49110
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: revisit gc autotuning as of commit 4608fdfc07e1 ("netfilter: conntrack: collect all entries in one cycle") conntrack gc was changed to run every 2 minutes. On systems where conntrack hash table is set to large value, most evictions happen from gc worker rather than the packet path due to hash table distribution. This causes netlink event overflows when events are collected. This change collects average expiry of scanne... • https://git.kernel.org/stable/c/58d52743ae85d28c9335c6034d6ce350b8689951 •

CVE-2022-49109 – ceph: fix inode reference leakage in ceph_get_snapdir()
https://notcve.org/view.php?id=CVE-2022-49109
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: ceph: fix inode reference leakage in ceph_get_snapdir() The ceph_get_inode() will search for or insert a new inode into the hash for the given vino, and return a reference to it. If new is non-NULL, its reference is consumed. We should release the reference when in error handing cases. • https://git.kernel.org/stable/c/9030aaf9bf0a1eee47a154c316c789e959638b0f •

CVE-2022-49108 – clk: mediatek: Fix memory leaks on probe
https://notcve.org/view.php?id=CVE-2022-49108
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: Fix memory leaks on probe Handle the error branches to free memory where required. Addresses-Coverity-ID: 1491825 ("Resource leak") • https://git.kernel.org/stable/c/710573dee31b4ca34abeb384c6e3db499c0af65f •

CVE-2022-49107 – ceph: fix memory leak in ceph_readdir when note_last_dentry returns error
https://notcve.org/view.php?id=CVE-2022-49107
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: ceph: fix memory leak in ceph_readdir when note_last_dentry returns error Reset the last_readdir at the same time, and add a comment explaining why we don't free last_readdir when dir_emit returns false. • https://git.kernel.org/stable/c/9030aaf9bf0a1eee47a154c316c789e959638b0f •