Linux

Linux

7462 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 17.05.2024 14:15:16
  • Zuletzt bearbeitet 26.09.2025 14:54:38

In the Linux kernel, the following vulnerability has been resolved: LoongArch: Define the __io_aw() hook as mmiowb() Commit fb24ea52f78e0d595852e ("drivers: Remove explicit invocations of mmiowb()") remove all mmiowb() in drivers, but it says: "NO...

  • EPSS 0.02%
  • Veröffentlicht 17.05.2024 14:15:16
  • Zuletzt bearbeitet 17.12.2025 19:26:38

In the Linux kernel, the following vulnerability has been resolved: soc: fsl: qbman: Use raw spinlock for cgr_lock smp_call_function always runs its callback in hard IRQ context, even on PREEMPT_RT, where spinlocks can sleep. So we need to use a ra...

  • EPSS 0.01%
  • Veröffentlicht 17.05.2024 14:15:15
  • Zuletzt bearbeitet 16.12.2025 20:10:29

In the Linux kernel, the following vulnerability has been resolved: mmc: core: Avoid negative index with array access Commit 4d0c8d0aef63 ("mmc: core: Use mrq.sbc in close-ended ffu") assigns prev_idata = idatas[i - 1], but doesn't check that the i...

  • EPSS 0.01%
  • Veröffentlicht 17.05.2024 14:15:15
  • Zuletzt bearbeitet 19.09.2025 16:16:45

In the Linux kernel, the following vulnerability has been resolved: swiotlb: Fix double-allocation of slots due to broken alignment handling Commit bbb73a103fbb ("swiotlb: fix a braino in the alignment check fix"), which was a fix for commit 0eee5a...

  • EPSS 0.01%
  • Veröffentlicht 17.05.2024 14:15:14
  • Zuletzt bearbeitet 17.12.2025 19:36:07

In the Linux kernel, the following vulnerability has been resolved: ext4: fix corruption during on-line resize We observed a corruption during on-line resize of a file system that is larger than 16 TiB with 4k block size. With having more then 2^32...

  • EPSS 0.01%
  • Veröffentlicht 17.05.2024 14:15:14
  • Zuletzt bearbeitet 19.09.2025 16:02:27

In the Linux kernel, the following vulnerability has been resolved: md/dm-raid: don't call md_reap_sync_thread() directly Currently md_reap_sync_thread() is called from raid_message() directly without holding 'reconfig_mutex', this is definitely un...

  • EPSS 0.01%
  • Veröffentlicht 17.05.2024 14:15:14
  • Zuletzt bearbeitet 23.12.2025 18:29:25

In the Linux kernel, the following vulnerability has been resolved: PCI/PM: Drain runtime-idle callbacks before driver removal A race condition between the .runtime_idle() callback and the .remove() callback in the rtsx_pcr PCI driver leads to a ke...

  • EPSS 0.01%
  • Veröffentlicht 17.05.2024 14:15:14
  • Zuletzt bearbeitet 26.09.2025 15:56:44

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix the lifetime of the bo cursor memory The cleanup can be dispatched while the atomic update is still active, which means that the memory acquired in the atomic updat...

  • EPSS 0.02%
  • Veröffentlicht 17.05.2024 14:15:13
  • Zuletzt bearbeitet 26.09.2025 15:57:45

In the Linux kernel, the following vulnerability has been resolved: x86/efistub: Call mixed mode boot services on the firmware's stack Normally, the EFI stub calls into the EFI boot services using the stack that was live when the stub was entered. ...

  • EPSS 0.02%
  • Veröffentlicht 17.05.2024 14:15:13
  • Zuletzt bearbeitet 19.09.2025 15:58:56

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Mark target gfn of emulated atomic instruction as dirty When emulating an atomic access on behalf of the guest, mark the target gfn dirty if the CMPXCHG by KVM is attempt...