CVE-2021-47116
- EPSS 0.02%
- Veröffentlicht 15.03.2024 21:15:06
- Zuletzt bearbeitet 07.01.2025 17:31:32
In the Linux kernel, the following vulnerability has been resolved: ext4: fix memory leak in ext4_mb_init_backend on error path. Fix a memory leak discovered by syzbot when a file system is corrupted with an illegally large s_log_groups_per_flex.
CVE-2021-47117
- EPSS 0.01%
- Veröffentlicht 15.03.2024 21:15:06
- Zuletzt bearbeitet 27.02.2025 03:20:09
In the Linux kernel, the following vulnerability has been resolved: ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed We got follow bug_on when run fsstress with injecting IO fault: [130747.323114] kernel BUG at fs/ext4/extent...
CVE-2021-47118
- EPSS 0.02%
- Veröffentlicht 15.03.2024 21:15:06
- Zuletzt bearbeitet 27.02.2025 03:20:09
In the Linux kernel, the following vulnerability has been resolved: pid: take a reference when initializing `cad_pid` During boot, kernel_init_freeable() initializes `cad_pid` to the init task's struct pid. Later on, we may change `cad_pid` via a ...
CVE-2024-2193
- EPSS 0.9%
- Veröffentlicht 15.03.2024 18:15:08
- Zuletzt bearbeitet 15.04.2026 00:35:42
A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data ...
CVE-2023-28746
- EPSS 0.04%
- Veröffentlicht 14.03.2024 17:15:50
- Zuletzt bearbeitet 12.05.2026 11:16:12
Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2023-52608
- EPSS 0.01%
- Veröffentlicht 13.03.2024 14:15:07
- Zuletzt bearbeitet 25.02.2025 18:52:37
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Check mailbox/SMT channel for consistency On reception of a completion interrupt the shared memory area is accessed to retrieve the message header at first and ...
CVE-2024-26629
- EPSS 0.01%
- Veröffentlicht 13.03.2024 14:15:07
- Zuletzt bearbeitet 12.05.2026 12:16:18
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix RELEASE_LOCKOWNER The test on so_count in nfsd4_release_lockowner() is nonsense and harmful. Revert to using check_for_locks(), changing that to not sleep. First: harmf...
CVE-2024-26610
- EPSS 0.01%
- Veröffentlicht 11.03.2024 18:15:19
- Zuletzt bearbeitet 12.12.2024 17:31:47
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix a memory corruption iwl_fw_ini_trigger_tlv::data is a pointer to a __le32, which means that if we copy to iwl_fw_ini_trigger_tlv::data + offset while offset is i...
CVE-2024-26612
- EPSS 0.02%
- Veröffentlicht 11.03.2024 18:15:19
- Zuletzt bearbeitet 03.04.2025 15:19:19
In the Linux kernel, the following vulnerability has been resolved: netfs, fscache: Prevent Oops in fscache_put_cache() This function dereferences "cache" and then checks if it's IS_ERR_OR_NULL(). Check first, then dereference.
CVE-2024-26614
- EPSS 0.01%
- Veröffentlicht 11.03.2024 18:15:19
- Zuletzt bearbeitet 03.04.2025 15:20:30
In the Linux kernel, the following vulnerability has been resolved: tcp: make sure init the accept_queue's spinlocks once When I run syz's reproduction C program locally, it causes the following issue: pvqspinlock: lock 0xffff9d181cd5c660 has corru...