Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-29581)
Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions. (CVE-2022-30594)
More Stories
ruby-3.3.8-19.fc41
FEDORA-2025-60513bdbbd Packages in this update: ruby-3.3.8-19.fc41 Update description: Upgrade to Ruby 3.3.8. CVE-2025-25186: Fix Net::IMAP vulnerable to possible DoS by...
dnf-4.23.0-1.fc40.1
FEDORA-2025-21c36b3aa5 Packages in this update: dnf-4.23.0-1.fc40.1 Update description: This releases preserves enablement state of dnf-automatic.timer when upgrading to Fedora 41....
podman-tui-1.5.0-2.el9
FEDORA-EPEL-2025-7c57e75cbc Packages in this update: podman-tui-1.5.0-2.el9 Update description: release v1.5.0 Read More
prometheus-podman-exporter-1.16.0-1.fc42
FEDORA-2025-12ac4e9cfd Packages in this update: prometheus-podman-exporter-1.16.0-1.fc42 Update description: release v1.16.0 Read More
prometheus-podman-exporter-1.16.0-1.fc41
FEDORA-2025-b0915f0a19 Packages in this update: prometheus-podman-exporter-1.16.0-1.fc41 Update description: release v1.16.0 Read More
prometheus-podman-exporter-1.16.0-1.el9
FEDORA-EPEL-2025-6653a27cfd Packages in this update: prometheus-podman-exporter-1.16.0-1.el9 Update description: release 1.16.0 Read More