- EPSS 0.03%
- Veröffentlicht 18.06.2025 11:02:36
- Zuletzt bearbeitet 18.06.2025 13:47:40
In the Linux kernel, the following vulnerability has been resolved: sched/core: Do not requeue task on CPU excluded from cpus_mask The following warning was triggered on a large machine early in boot on a distribution kernel but the same problem sh...
- EPSS 0.03%
- Veröffentlicht 18.06.2025 11:02:35
- Zuletzt bearbeitet 18.06.2025 13:47:40
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts Ensure SRB is returned during I/O timeout error escalation. If that is not possible fail the escalation path. ...
- EPSS 0.04%
- Veröffentlicht 18.06.2025 11:02:34
- Zuletzt bearbeitet 18.06.2025 13:47:40
In the Linux kernel, the following vulnerability has been resolved: video: fbdev: s3fb: Check the size of screen before memset_io() In the function s3fb_set_par(), the value of 'screen_size' is calculated by the user input. If the user provides the...
- EPSS 0.03%
- Veröffentlicht 18.06.2025 11:02:33
- Zuletzt bearbeitet 18.06.2025 13:47:40
In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: Cleanup CPU timers before freeing them during exec Commit 55e8c8eb2c7b ("posix-cpu-timers: Store a reference to a pid not a task") started looking up tasks by PID...
- EPSS 0.03%
- Veröffentlicht 18.06.2025 11:02:33
- Zuletzt bearbeitet 18.06.2025 13:47:40
In the Linux kernel, the following vulnerability has been resolved: x86/kprobes: Update kcb status flag after singlestepping Fix kprobes to update kcb (kprobes control block) status flag to KPROBE_HIT_SSDONE even if the kp->post_handler is not set....
- EPSS 0.05%
- Veröffentlicht 18.06.2025 11:02:32
- Zuletzt bearbeitet 18.06.2025 13:47:40
In the Linux kernel, the following vulnerability has been resolved: spmi: trace: fix stack-out-of-bound access in SPMI tracing functions trace_spmi_write_begin() and trace_spmi_read_end() both call memcpy() with a length of "len + 1". This leads t...
- EPSS 0.04%
- Veröffentlicht 18.06.2025 11:02:31
- Zuletzt bearbeitet 18.06.2025 13:47:40
In the Linux kernel, the following vulnerability has been resolved: dm thin: fix use-after-free crash in dm_sm_register_threshold_callback Fault inject on pool metadata device reports: BUG: KASAN: use-after-free in dm_pool_register_metadata_thres...
- EPSS 0.04%
- Veröffentlicht 18.06.2025 11:02:31
- Zuletzt bearbeitet 18.06.2025 13:47:40
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) KASAN reports: [ 4.668325][ T0] BUG: KASAN: wild-memory-access in dmar_parse_one_rhsa (arch/x86/include/asm/b...
- EPSS 0.03%
- Veröffentlicht 18.06.2025 11:02:30
- Zuletzt bearbeitet 18.06.2025 13:47:40
In the Linux kernel, the following vulnerability has been resolved: btrfs: replace BTRFS_MAX_EXTENT_SIZE with fs_info->max_extent_size On zoned filesystem, data write out is limited by max_zone_append_size, and a large ordered extent is split accor...
- EPSS 0.03%
- Veröffentlicht 18.06.2025 11:02:30
- Zuletzt bearbeitet 18.06.2025 13:47:40
In the Linux kernel, the following vulnerability has been resolved: locking/csd_lock: Change csdlock_debug from early_param to __setup The csdlock_debug kernel-boot parameter is parsed by the early_param() function csdlock_debug(). If set, csdlock...