CVE-2023-52624
- EPSS 0.01%
- Veröffentlicht 26.03.2024 18:15:08
- Zuletzt bearbeitet 17.03.2025 15:19:42
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Wake DMCUB before executing GPINT commands [Why] DMCUB can be in idle when we attempt to interface with the HW through the GPINT mailbox resulting in a system hang...
CVE-2024-26644
- EPSS 0.01%
- Veröffentlicht 26.03.2024 16:15:12
- Zuletzt bearbeitet 17.07.2025 17:15:33
In the Linux kernel, the following vulnerability has been resolved: btrfs: don't abort filesystem when attempting to snapshot deleted subvolume If the source file descriptor to the snapshot ioctl refers to a deleted subvolume, we get the following ...
CVE-2021-47158
- EPSS 0.02%
- Veröffentlicht 25.03.2024 10:15:07
- Zuletzt bearbeitet 12.12.2024 15:50:01
In the Linux kernel, the following vulnerability has been resolved: net: dsa: sja1105: add error handling in sja1105_setup() If any of sja1105_static_config_load(), sja1105_clocking_setup() or sja1105_devlink_setup() fails, we can't just return in ...
CVE-2021-47139
- EPSS 0.02%
- Veröffentlicht 25.03.2024 09:15:08
- Zuletzt bearbeitet 13.03.2025 21:09:36
In the Linux kernel, the following vulnerability has been resolved: net: hns3: put off calling register_netdev() until client initialize complete Currently, the netdevice is registered before client initializing complete. So there is a timewindow b...
CVE-2021-47143
- EPSS 0.02%
- Veröffentlicht 25.03.2024 09:15:08
- Zuletzt bearbeitet 13.03.2025 21:09:12
In the Linux kernel, the following vulnerability has been resolved: net/smc: remove device from smcd_dev_list after failed device_add() If the device_add() for a smcd_dev fails, there's no cleanup step that rolls back the earlier list_add(). The de...
CVE-2023-52618
- EPSS 0.06%
- Veröffentlicht 18.03.2024 11:15:09
- Zuletzt bearbeitet 04.04.2025 14:51:32
In the Linux kernel, the following vulnerability has been resolved: block/rnbd-srv: Check for unlikely string overflow Since "dev_search_path" can technically be as large as PATH_MAX, there was a risk of truncation when copying it and a second stri...
CVE-2023-52610
- EPSS 0.01%
- Veröffentlicht 18.03.2024 11:15:07
- Zuletzt bearbeitet 10.03.2025 15:39:09
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_ct: fix skb leak and crash on ooo frags act_ct adds skb->users before defragmentation. If frags arrive in order, the last frag's reference is reset in: inet_frag_...
CVE-2021-47113
- EPSS 0.02%
- Veröffentlicht 15.03.2024 21:15:06
- Zuletzt bearbeitet 13.03.2025 19:36:00
In the Linux kernel, the following vulnerability has been resolved: btrfs: abort in rename_exchange if we fail to insert the second ref Error injection stress uncovered a problem where we'd leave a dangling inode ref if we failed during a rename_ex...
CVE-2021-47116
- EPSS 0.02%
- Veröffentlicht 15.03.2024 21:15:06
- Zuletzt bearbeitet 07.01.2025 17:31:32
In the Linux kernel, the following vulnerability has been resolved: ext4: fix memory leak in ext4_mb_init_backend on error path. Fix a memory leak discovered by syzbot when a file system is corrupted with an illegally large s_log_groups_per_flex.
CVE-2024-2193
- EPSS 0.9%
- Veröffentlicht 15.03.2024 18:15:08
- Zuletzt bearbeitet 15.04.2026 00:35:42
A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data ...