Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-49511

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> fbdev: defio: fix the pagelist corruption<br /> <br /> Easily hit the below list corruption:<br /> ==<br /> list_add corruption. prev-&gt;next should be next (ffffffffc0ceb090), but<br /> was ffffec604507edc8. (prev=ffffec604507edc8).<br /> WARNING: CPU: 65 PID: 3959 at lib/list_debug.c:26<br /> __list_add_valid+0x53/0x80<br /> CPU: 65 PID: 3959 Comm: fbdev Tainted: G U<br /> RIP: 0010:__list_add_valid+0x53/0x80<br /> Call Trace:<br /> <br /> fb_deferred_io_mkwrite+0xea/0x150<br /> do_page_mkwrite+0x57/0xc0<br /> do_wp_page+0x278/0x2f0<br /> __handle_mm_fault+0xdc2/0x1590<br /> handle_mm_fault+0xdd/0x2c0<br /> do_user_addr_fault+0x1d3/0x650<br /> exc_page_fault+0x77/0x180<br /> ? asm_exc_page_fault+0x8/0x30<br /> asm_exc_page_fault+0x1e/0x30<br /> RIP: 0033:0x7fd98fc8fad1<br /> ==<br /> <br /> Figure out the race happens when one process is adding &amp;page-&gt;lru into<br /> the pagelist tail in fb_deferred_io_mkwrite(), another process is<br /> re-initializing the same &amp;page-&gt;lru in fb_deferred_io_fault(), which is<br /> not protected by the lock.<br /> <br /> This fix is to init all the page lists one time during initialization,<br /> it not only fixes the list corruption, but also avoids INIT_LIST_HEAD()<br /> redundantly.<br /> <br /> V2: change "int i" to "unsigned int i" (Geert Uytterhoeven)
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2022-49512

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mtd: rawnand: denali: Use managed device resources<br /> <br /> All of the resources used by this driver has managed interfaces, so use<br /> them. Otherwise we will get the following splat:<br /> <br /> [ 4.472703] denali-nand-pci 0000:00:05.0: timeout while waiting for irq 0x1000<br /> [ 4.474071] denali-nand-pci: probe of 0000:00:05.0 failed with error -5<br /> [ 4.473538] nand: No NAND device found<br /> [ 4.474068] BUG: unable to handle page fault for address: ffffc90005000410<br /> [ 4.475169] #PF: supervisor write access in kernel mode<br /> [ 4.475579] #PF: error_code(0x0002) - not-present page<br /> [ 4.478362] RIP: 0010:iowrite32+0x9/0x50<br /> [ 4.486068] Call Trace:<br /> [ 4.486269] <br /> [ 4.486443] denali_isr+0x15b/0x300 [denali]<br /> [ 4.486788] ? denali_direct_write+0x50/0x50 [denali]<br /> [ 4.487189] __handle_irq_event_percpu+0x161/0x3b0<br /> [ 4.487571] handle_irq_event+0x7d/0x1b0<br /> [ 4.487884] handle_fasteoi_irq+0x2b0/0x770<br /> [ 4.488219] __common_interrupt+0xc8/0x1b0<br /> [ 4.488549] common_interrupt+0x9a/0xc0
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2022-49513

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cpufreq: governor: Use kobject release() method to free dbs_data<br /> <br /> The struct dbs_data embeds a struct gov_attr_set and<br /> the struct gov_attr_set embeds a kobject. Since every kobject must have<br /> a release() method and we can&amp;#39;t use kfree() to free it directly,<br /> so introduce cpufreq_dbs_data_release() to release the dbs_data via<br /> the kobject::release() method. This fixes the calltrace like below:<br /> <br /> ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x34<br /> WARNING: CPU: 12 PID: 810 at lib/debugobjects.c:505 debug_print_object+0xb8/0x100<br /> Modules linked in:<br /> CPU: 12 PID: 810 Comm: sh Not tainted 5.16.0-next-20220120-yocto-standard+ #536<br /> Hardware name: Marvell OcteonTX CN96XX board (DT)<br /> pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> pc : debug_print_object+0xb8/0x100<br /> lr : debug_print_object+0xb8/0x100<br /> sp : ffff80001dfcf9a0<br /> x29: ffff80001dfcf9a0 x28: 0000000000000001 x27: ffff0001464f0000<br /> x26: 0000000000000000 x25: ffff8000090e3f00 x24: ffff80000af60210<br /> x23: ffff8000094dfb78 x22: ffff8000090e3f00 x21: ffff0001080b7118<br /> x20: ffff80000aeb2430 x19: ffff800009e8f5e0 x18: 0000000000000000<br /> x17: 0000000000000002 x16: 00004d62e58be040 x15: 013590470523aff8<br /> x14: ffff8000090e1828 x13: 0000000001359047 x12: 00000000f5257d14<br /> x11: 0000000000040591 x10: 0000000066c1ffea x9 : ffff8000080d15e0<br /> x8 : ffff80000a1765a8 x7 : 0000000000000000 x6 : 0000000000000001<br /> x5 : ffff800009e8c000 x4 : ffff800009e8c760 x3 : 0000000000000000<br /> x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0001474ed040<br /> Call trace:<br /> debug_print_object+0xb8/0x100<br /> __debug_check_no_obj_freed+0x1d0/0x25c<br /> debug_check_no_obj_freed+0x24/0xa0<br /> kfree+0x11c/0x440<br /> cpufreq_dbs_governor_exit+0xa8/0xac<br /> cpufreq_exit_governor+0x44/0x90<br /> cpufreq_set_policy+0x29c/0x570<br /> store_scaling_governor+0x110/0x154<br /> store+0xb0/0xe0<br /> sysfs_kf_write+0x58/0x84<br /> kernfs_fop_write_iter+0x12c/0x1c0<br /> new_sync_write+0xf0/0x18c<br /> vfs_write+0x1cc/0x220<br /> ksys_write+0x74/0x100<br /> __arm64_sys_write+0x28/0x3c<br /> invoke_syscall.constprop.0+0x58/0xf0<br /> do_el0_svc+0x70/0x170<br /> el0_svc+0x54/0x190<br /> el0t_64_sync_handler+0xa4/0x130<br /> el0t_64_sync+0x1a0/0x1a4<br /> irq event stamp: 189006<br /> hardirqs last enabled at (189005): [] finish_task_switch.isra.0+0xe0/0x2c0<br /> hardirqs last disabled at (189006): [] el1_dbg+0x24/0xa0<br /> softirqs last enabled at (188966): [] __do_softirq+0x4b0/0x6a0<br /> softirqs last disabled at (188957): [] __irq_exit_rcu+0x108/0x1a4<br /> <br /> [ rjw: Because can be freed by the gov_attr_set_put() in<br /> cpufreq_dbs_governor_exit() now, it is also necessary to put the<br /> invocation of the governor -&gt;exit() callback into the new<br /> cpufreq_dbs_data_release() function. ]
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2022-49515

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t<br /> <br /> The CS35L41_NUM_OTP_ELEM is 100, but only 99 entries are defined in<br /> the array otp_map_1/2[CS35L41_NUM_OTP_ELEM], this will trigger UBSAN<br /> to report a shift-out-of-bounds warning in the cs35l41_otp_unpack()<br /> since the last entry in the array will result in GENMASK(-1, 0).<br /> <br /> UBSAN reports this problem:<br /> UBSAN: shift-out-of-bounds in /home/hwang4/build/jammy/jammy/sound/soc/codecs/cs35l41-lib.c:836:8<br /> shift exponent 64 is too large for 64-bit type &amp;#39;long unsigned int&amp;#39;<br /> CPU: 10 PID: 595 Comm: systemd-udevd Not tainted 5.15.0-23-generic #23<br /> Hardware name: LENOVO \x02MFG_IN_GO/\x02MFG_IN_GO, BIOS N3GET19W (1.00 ) 03/11/2022<br /> Call Trace:<br /> <br /> show_stack+0x52/0x58<br /> dump_stack_lvl+0x4a/0x5f<br /> dump_stack+0x10/0x12<br /> ubsan_epilogue+0x9/0x45<br /> __ubsan_handle_shift_out_of_bounds.cold+0x61/0xef<br /> ? regmap_unlock_mutex+0xe/0x10<br /> cs35l41_otp_unpack.cold+0x1c6/0x2b2 [snd_soc_cs35l41_lib]<br /> cs35l41_hda_probe+0x24f/0x33a [snd_hda_scodec_cs35l41]<br /> cs35l41_hda_i2c_probe+0x65/0x90 [snd_hda_scodec_cs35l41_i2c]<br /> ? cs35l41_hda_i2c_remove+0x20/0x20 [snd_hda_scodec_cs35l41_i2c]<br /> i2c_device_probe+0x252/0x2b0
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2022-49518

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ASoC: SOF: ipc3-topology: Correct get_control_data for non bytes payload<br /> <br /> It is possible to craft a topology where sof_get_control_data() would do<br /> out of bounds access because it expects that it is only called when the<br /> payload is bytes type.<br /> Confusingly it also handles other types of controls, but the payload<br /> parsing implementation is only valid for bytes.<br /> <br /> Fix the code to count the non bytes controls and instead of storing a<br /> pointer to sof_abi_hdr in sof_widget_data (which is only valid for bytes),<br /> store the pointer to the data itself and add a new member to save the size<br /> of the data.<br /> <br /> In case of non bytes controls we store the pointer to the chanv itself,<br /> which is just an array of values at the end.<br /> <br /> In case of bytes control, drop the wrong cdata-&gt;data (wdata[i].pdata) check<br /> against NULL since it is incorrect and invalid in this context.<br /> The data is pointing to the end of cdata struct, so it should never be<br /> null.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2022-49519

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ath10k: skip ath10k_halt during suspend for driver state RESTARTING<br /> <br /> Double free crash is observed when FW recovery(caused by wmi<br /> timeout/crash) is followed by immediate suspend event. The FW recovery<br /> is triggered by ath10k_core_restart() which calls driver clean up via<br /> ath10k_halt(). When the suspend event occurs between the FW recovery,<br /> the restart worker thread is put into frozen state until suspend completes.<br /> The suspend event triggers ath10k_stop() which again triggers ath10k_halt()<br /> The double invocation of ath10k_halt() causes ath10k_htt_rx_free() to be<br /> called twice(Note: ath10k_htt_rx_alloc was not called by restart worker<br /> thread because of its frozen state), causing the crash.<br /> <br /> To fix this, during the suspend flow, skip call to ath10k_halt() in<br /> ath10k_stop() when the current driver state is ATH10K_STATE_RESTARTING.<br /> Also, for driver state ATH10K_STATE_RESTARTING, call<br /> ath10k_wait_for_suspend() in ath10k_stop(). This is because call to<br /> ath10k_wait_for_suspend() is skipped later in<br /> [ath10k_halt() &gt; ath10k_core_stop()] for the driver state<br /> ATH10K_STATE_RESTARTING.<br /> <br /> The frozen restart worker thread will be cancelled during resume when the<br /> device comes out of suspend.<br /> <br /> Below is the crash stack for reference:<br /> <br /> [ 428.469167] ------------[ cut here ]------------<br /> [ 428.469180] kernel BUG at mm/slub.c:4150!<br /> [ 428.469193] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI<br /> [ 428.469219] Workqueue: events_unbound async_run_entry_fn<br /> [ 428.469230] RIP: 0010:kfree+0x319/0x31b<br /> [ 428.469241] RSP: 0018:ffffa1fac015fc30 EFLAGS: 00010246<br /> [ 428.469247] RAX: ffffedb10419d108 RBX: ffff8c05262b0000<br /> [ 428.469252] RDX: ffff8c04a8c07000 RSI: 0000000000000000<br /> [ 428.469256] RBP: ffffa1fac015fc78 R08: 0000000000000000<br /> [ 428.469276] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [ 428.469285] Call Trace:<br /> [ 428.469295] ? dma_free_attrs+0x5f/0x7d<br /> [ 428.469320] ath10k_core_stop+0x5b/0x6f<br /> [ 428.469336] ath10k_halt+0x126/0x177<br /> [ 428.469352] ath10k_stop+0x41/0x7e<br /> [ 428.469387] drv_stop+0x88/0x10e<br /> [ 428.469410] __ieee80211_suspend+0x297/0x411<br /> [ 428.469441] rdev_suspend+0x6e/0xd0<br /> [ 428.469462] wiphy_suspend+0xb1/0x105<br /> [ 428.469483] ? name_show+0x2d/0x2d<br /> [ 428.469490] dpm_run_callback+0x8c/0x126<br /> [ 428.469511] ? name_show+0x2d/0x2d<br /> [ 428.469517] __device_suspend+0x2e7/0x41b<br /> [ 428.469523] async_suspend+0x1f/0x93<br /> [ 428.469529] async_run_entry_fn+0x3d/0xd1<br /> [ 428.469535] process_one_work+0x1b1/0x329<br /> [ 428.469541] worker_thread+0x213/0x372<br /> [ 428.469547] kthread+0x150/0x15f<br /> [ 428.469552] ? pr_cont_work+0x58/0x58<br /> [ 428.469558] ? kthread_blkcg+0x31/0x31<br /> <br /> Tested-on: QCA6174 hw3.2 PCI WLAN.RM.4.4.1-00288-QCARMSWPZ-1
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2022-49501

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> usbnet: Run unregister_netdev() before unbind() again<br /> <br /> Commit 2c9d6c2b871d ("usbnet: run unbind() before unregister_netdev()")<br /> sought to fix a use-after-free on disconnect of USB Ethernet adapters.<br /> <br /> It turns out that a different fix is necessary to address the issue:<br /> https://lore.kernel.org/netdev/18b3541e5372bc9b9fc733d422f4e698c089077c.1650177997.git.lukas@wunner.de/<br /> <br /> So the commit was not necessary.<br /> <br /> The commit made binding and unbinding of USB Ethernet asymmetrical:<br /> Before, usbnet_probe() first invoked the -&gt;bind() callback and then<br /> register_netdev(). usbnet_disconnect() mirrored that by first invoking<br /> unregister_netdev() and then -&gt;unbind().<br /> <br /> Since the commit, the order in usbnet_disconnect() is reversed and no<br /> longer mirrors usbnet_probe().<br /> <br /> One consequence is that a PHY disconnected (and stopped) in -&gt;unbind()<br /> is afterwards stopped once more by unregister_netdev() as it closes the<br /> netdev before unregistering. That necessitates a contortion in -&gt;stop()<br /> because the PHY may only be stopped if it hasn&amp;#39;t already been<br /> disconnected.<br /> <br /> Reverting the commit allows making the call to phy_stop() unconditional<br /> in -&gt;stop().
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2025

CVE-2022-49505

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> NFC: NULL out the dev-&gt;rfkill to prevent UAF<br /> <br /> Commit 3e3b5dfcd16a ("NFC: reorder the logic in nfc_{un,}register_device")<br /> assumes the device_is_registered() in function nfc_dev_up() will help<br /> to check when the rfkill is unregistered. However, this check only<br /> take effect when device_del(&amp;dev-&gt;dev) is done in nfc_unregister_device().<br /> Hence, the rfkill object is still possible be dereferenced.<br /> <br /> The crash trace in latest kernel (5.18-rc2):<br /> <br /> [ 68.760105] ==================================================================<br /> [ 68.760330] BUG: KASAN: use-after-free in __lock_acquire+0x3ec1/0x6750<br /> [ 68.760756] Read of size 8 at addr ffff888009c93018 by task fuzz/313<br /> [ 68.760756]<br /> [ 68.760756] CPU: 0 PID: 313 Comm: fuzz Not tainted 5.18.0-rc2 #4<br /> [ 68.760756] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014<br /> [ 68.760756] Call Trace:<br /> [ 68.760756] <br /> [ 68.760756] dump_stack_lvl+0x57/0x7d<br /> [ 68.760756] print_report.cold+0x5e/0x5db<br /> [ 68.760756] ? __lock_acquire+0x3ec1/0x6750<br /> [ 68.760756] kasan_report+0xbe/0x1c0<br /> [ 68.760756] ? __lock_acquire+0x3ec1/0x6750<br /> [ 68.760756] __lock_acquire+0x3ec1/0x6750<br /> [ 68.760756] ? lockdep_hardirqs_on_prepare+0x410/0x410<br /> [ 68.760756] ? register_lock_class+0x18d0/0x18d0<br /> [ 68.760756] lock_acquire+0x1ac/0x4f0<br /> [ 68.760756] ? rfkill_blocked+0xe/0x60<br /> [ 68.760756] ? lockdep_hardirqs_on_prepare+0x410/0x410<br /> [ 68.760756] ? mutex_lock_io_nested+0x12c0/0x12c0<br /> [ 68.760756] ? nla_get_range_signed+0x540/0x540<br /> [ 68.760756] ? _raw_spin_lock_irqsave+0x4e/0x50<br /> [ 68.760756] _raw_spin_lock_irqsave+0x39/0x50<br /> [ 68.760756] ? rfkill_blocked+0xe/0x60<br /> [ 68.760756] rfkill_blocked+0xe/0x60<br /> [ 68.760756] nfc_dev_up+0x84/0x260<br /> [ 68.760756] nfc_genl_dev_up+0x90/0xe0<br /> [ 68.760756] genl_family_rcv_msg_doit+0x1f4/0x2f0<br /> [ 68.760756] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x230/0x230<br /> [ 68.760756] ? security_capable+0x51/0x90<br /> [ 68.760756] genl_rcv_msg+0x280/0x500<br /> [ 68.760756] ? genl_get_cmd+0x3c0/0x3c0<br /> [ 68.760756] ? lock_acquire+0x1ac/0x4f0<br /> [ 68.760756] ? nfc_genl_dev_down+0xe0/0xe0<br /> [ 68.760756] ? lockdep_hardirqs_on_prepare+0x410/0x410<br /> [ 68.760756] netlink_rcv_skb+0x11b/0x340<br /> [ 68.760756] ? genl_get_cmd+0x3c0/0x3c0<br /> [ 68.760756] ? netlink_ack+0x9c0/0x9c0<br /> [ 68.760756] ? netlink_deliver_tap+0x136/0xb00<br /> [ 68.760756] genl_rcv+0x1f/0x30<br /> [ 68.760756] netlink_unicast+0x430/0x710<br /> [ 68.760756] ? memset+0x20/0x40<br /> [ 68.760756] ? netlink_attachskb+0x740/0x740<br /> [ 68.760756] ? __build_skb_around+0x1f4/0x2a0<br /> [ 68.760756] netlink_sendmsg+0x75d/0xc00<br /> [ 68.760756] ? netlink_unicast+0x710/0x710<br /> [ 68.760756] ? netlink_unicast+0x710/0x710<br /> [ 68.760756] sock_sendmsg+0xdf/0x110<br /> [ 68.760756] __sys_sendto+0x19e/0x270<br /> [ 68.760756] ? __ia32_sys_getpeername+0xa0/0xa0<br /> [ 68.760756] ? fd_install+0x178/0x4c0<br /> [ 68.760756] ? fd_install+0x195/0x4c0<br /> [ 68.760756] ? kernel_fpu_begin_mask+0x1c0/0x1c0<br /> [ 68.760756] __x64_sys_sendto+0xd8/0x1b0<br /> [ 68.760756] ? lockdep_hardirqs_on+0xbf/0x130<br /> [ 68.760756] ? syscall_enter_from_user_mode+0x1d/0x50<br /> [ 68.760756] do_syscall_64+0x3b/0x90<br /> [ 68.760756] entry_SYSCALL_64_after_hwframe+0x44/0xae<br /> [ 68.760756] RIP: 0033:0x7f67fb50e6b3<br /> ...<br /> [ 68.760756] RSP: 002b:00007f67fa91fe90 EFLAGS: 00000293 ORIG_RAX: 000000000000002c<br /> [ 68.760756] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f67fb50e6b3<br /> [ 68.760756] RDX: 000000000000001c RSI: 0000559354603090 RDI: 0000000000000003<br /> [ 68.760756] RBP: 00007f67fa91ff00 R08: 00007f67fa91fedc R09: 000000000000000c<br /> [ 68.760756] R10: 0000000000000000 R11: 0000000000000293 R12: 00007ffe824d496e<br /> [ 68.760756] R13: 00007ffe824d496f R14: 00007f67fa120000 R15: 0000000000000003<br /> <br /> [ 68.760756] <br /> [ 68.760756]<br /> [ 68.760756] Allocated by task 279:<br /> [ 68.760756] kasan_save_stack+0x1e/0x40<br /> [<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2025

CVE-2022-49508

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> HID: elan: Fix potential double free in elan_input_configured<br /> <br /> &amp;#39;input&amp;#39; is a managed resource allocated with devm_input_allocate_device(),<br /> so there is no need to call input_free_device() explicitly or<br /> there will be a double free.<br /> <br /> According to the doc of devm_input_allocate_device():<br /> * Managed input devices do not need to be explicitly unregistered or<br /> * freed as it will be done automatically when owner device unbinds from<br /> * its driver (or binding fails).
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2022-49507

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> regulator: da9121: Fix uninit-value in da9121_assign_chip_model()<br /> <br /> KASAN report slab-out-of-bounds in __regmap_init as follows:<br /> <br /> BUG: KASAN: slab-out-of-bounds in __regmap_init drivers/base/regmap/regmap.c:841<br /> Read of size 1 at addr ffff88803678cdf1 by task xrun/9137<br /> <br /> CPU: 0 PID: 9137 Comm: xrun Tainted: G W 5.18.0-rc2<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014<br /> Call Trace:<br /> <br /> dump_stack_lvl+0xe8/0x15a lib/dump_stack.c:88<br /> print_report.cold+0xcd/0x69b mm/kasan/report.c:313<br /> kasan_report+0x8e/0xc0 mm/kasan/report.c:491<br /> __regmap_init+0x4540/0x4ba0 drivers/base/regmap/regmap.c:841<br /> __devm_regmap_init+0x7a/0x100 drivers/base/regmap/regmap.c:1266<br /> __devm_regmap_init_i2c+0x65/0x80 drivers/base/regmap/regmap-i2c.c:394<br /> da9121_i2c_probe+0x386/0x6d1 drivers/regulator/da9121-regulator.c:1039<br /> i2c_device_probe+0x959/0xac0 drivers/i2c/i2c-core-base.c:563<br /> <br /> This happend when da9121 device is probe by da9121_i2c_id, but with<br /> invalid dts. Thus, chip-&gt;subvariant_id is set to -EINVAL, and later<br /> da9121_assign_chip_model() will access &amp;#39;regmap&amp;#39; without init it.<br /> <br /> Fix it by return -EINVAL from da9121_assign_chip_model() if<br /> &amp;#39;chip-&gt;subvariant_id&amp;#39; is invalid.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2022-49502

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: rga: fix possible memory leak in rga_probe<br /> <br /> rga-&gt;m2m_dev needs to be freed when rga_probe fails.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2022-49499

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/msm: Fix null pointer dereferences without iommu<br /> <br /> Check if &amp;#39;aspace&amp;#39; is set before using it as it will stay null without<br /> IOMMU, such as on msm8974.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025