CVE-2021-47182
- EPSS 0.02%
- Veröffentlicht 10.04.2024 19:15:47
- Zuletzt bearbeitet 21.03.2025 11:54:05
In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix scsi_mode_sense() buffer length handling Several problems exist with scsi_mode_sense() buffer length handling: 1) The allocation length field of the MODE SENSE(10...
CVE-2021-47183
- EPSS 0.01%
- Veröffentlicht 10.04.2024 19:15:47
- Zuletzt bearbeitet 03.11.2025 18:15:38
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix link down processing to address NULL pointer dereference If an FC link down transition while PLOGIs are outstanding to fabric well known addresses, outstanding ABTS...
CVE-2024-26807
- EPSS 0.01%
- Veröffentlicht 04.04.2024 09:15:09
- Zuletzt bearbeitet 03.11.2025 20:16:11
In the Linux kernel, the following vulnerability has been resolved: Both cadence-quadspi ->runtime_suspend() and ->runtime_resume() implementations start with: struct cqspi_st *cqspi = dev_get_drvdata(dev); struct spi_controller *host = dev_get_d...
CVE-2024-26795
- EPSS 0.01%
- Veröffentlicht 04.04.2024 09:15:08
- Zuletzt bearbeitet 19.03.2025 11:42:41
In the Linux kernel, the following vulnerability has been resolved: riscv: Sparse-Memory/vmemmap out-of-bounds fix Offset vmemmap so that the first page of vmemmap will be mapped to the first page of physical memory in order to ensure that vmemmap’...
CVE-2024-26774
- EPSS 0.02%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 19.06.2025 13:15:31
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt Determine if bb_fragments is 0 instead of determining bb_free to eliminate the risk of dividing...
CVE-2024-26775
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 17.07.2025 17:15:35
In the Linux kernel, the following vulnerability has been resolved: aoe: avoid potential deadlock at set_capacity Move set_capacity() outside of the section procected by (&d->lock). To avoid possible interrupt unsafe locking scenario: CPU0...
CVE-2024-26776
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:53
- Zuletzt bearbeitet 27.02.2025 14:34:43
In the Linux kernel, the following vulnerability has been resolved: spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected Return IRQ_NONE from the interrupt handler when no interrupt was detected. Because an empty interrupt will cause ...
CVE-2024-26756
- EPSS 0.02%
- Veröffentlicht 03.04.2024 17:15:52
- Zuletzt bearbeitet 17.03.2025 16:56:57
In the Linux kernel, the following vulnerability has been resolved: md: Don't register sync_thread for reshape directly Currently, if reshape is interrupted, then reassemble the array will register sync_thread directly from pers->run(), in this cas...
CVE-2024-26757
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:52
- Zuletzt bearbeitet 04.04.2025 14:30:42
In the Linux kernel, the following vulnerability has been resolved: md: Don't ignore read-only array in md_check_recovery() Usually if the array is not read-write, md_check_recovery() won't register new sync_thread in the first place. And if the ar...
CVE-2024-26758
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:52
- Zuletzt bearbeitet 04.04.2025 14:30:16
In the Linux kernel, the following vulnerability has been resolved: md: Don't ignore suspended array in md_check_recovery() mddev_suspend() never stop sync_thread, hence it doesn't make sense to ignore suspended array in md_check_recovery(), which ...