vulnerability
Ubuntu: (CVE-2022-49260): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Feb 26, 2025 | Mar 19, 2025 | Oct 23, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Feb 26, 2025
Added
Mar 19, 2025
Modified
Oct 23, 2025
Description
In the Linux kernel, the following vulnerability has been resolved:
crypto: hisilicon/sec - fix the aead software fallback for engine
Due to the subreq pointer misuse the private context memory. The aead
soft crypto occasionally casues the OS panic as setting the 64K page.
Here is fix it.
Solutions
ubuntu-upgrade-linuxubuntu-upgrade-linux-awsubuntu-upgrade-linux-azureubuntu-upgrade-linux-azure-5-15ubuntu-upgrade-linux-gcpubuntu-upgrade-linux-gkeubuntu-upgrade-linux-hwe-5-15ubuntu-upgrade-linux-ibmubuntu-upgrade-linux-intel-iotgubuntu-upgrade-linux-intel-iotg-5-15ubuntu-upgrade-linux-kvmubuntu-upgrade-linux-lowlatencyubuntu-upgrade-linux-lowlatency-hwe-5-15ubuntu-upgrade-linux-oracleubuntu-upgrade-linux-raspiubuntu-upgrade-linux-realtime
References
- CVE-2022-49260
- https://attackerkb.com/topics/CVE-2022-49260
- URL-https://git.kernel.org/linus/0a2a464f863187f97e96ebc6384c052cafd4a54c
- URL-https://git.kernel.org/stable/c/0a2a464f863187f97e96ebc6384c052cafd4a54c
- URL-https://git.kernel.org/stable/c/40dba7c26e897c637e91312b35f664f1d4d0073c
- URL-https://git.kernel.org/stable/c/5c1149e2abe0b7489300736b8277b45b113de67f
- URL-https://git.kernel.org/stable/c/ef7b10f3cac7810ddcfd976304fd125aca33d144
- URL-https://www.cve.org/CVERecord?id=CVE-2022-49260
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.