CVE List

cve编号 漏洞描述 危险等级 包名 是否影响lns23-2 修复状态 发现时间 修复时间
CVE-2024-35996
In the Linux kernel, the following vulnerability has been resolved:\n\ncpu: Re-enable CPU mitigations by default for !X86 architectures\n\nRename x86's to CPU_MITIGATIONS, define it in generic code, and force it\non for all architectures exception x86. A recent commit to turn\nmitigations off by default if SPECULATION_MITIGATIONS=n kinda sorta\nmissed that "cpu_mitigations" is completely generic, whereas\nSPECULATION_MITIGATIONS is x86-specific.\n\nRename x86's SPECULATIVE_MITIGATIONS instead of keeping both and have it\nselect CPU_MITIGATIONS, as having two configs for the same thing is\nunnecessary and confusing. This will also allow x86 to use the knob to\nmanage mitigations that aren't strictly related to speculative\nexecution.\n\nUse another Kconfig to communicate to common code that CPU_MITIGATIONS\nis already defined instead of having x86's menu depend on the common\nCPU_MITIGATIONS. This allows keeping a single point of contact for all\nof x86's mitigations, and it's not clear that other architectures *want*\nto allow disabling mitigations at compile-time.
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-35995
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-25
CVE-2024-35988
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35982
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35978
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35971
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35967
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35965
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35957
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-35949
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-35948
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-35942
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-25
CVE-2024-35933
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35932
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35929
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-35926
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-25
CVE-2024-35920
In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mediatek: vcodec: adding lock to protect decoder context list\n\nAdd a lock for the ctx_list, to avoid accessing a NULL pointer\nwithin the 'vpu_dec_ipi_handler' function when the ctx_list has\nbeen deleted due to an unexpected behavior on the SCP IP block.\n\nHardware name: Google juniper sku16 board (DT)\npstate: 20400005 (nzCv daif +PAN -UAO -TCO BTYPE=--)\npc : vpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec]\nlr : scp_ipi_handler+0xd0/0x194 [mtk_scp]\nsp : ffffffc0131dbbd0\nx29: ffffffc0131dbbd0 x28: 0000000000000000\nx27: ffffff9bb277f348 x26: ffffff9bb242ad00\nx25: ffffffd2d440d3b8 x24: ffffffd2a13ff1d4\nx23: ffffff9bb7fe85a0 x22: ffffffc0133fbdb0\nx21: 0000000000000010 x20: ffffff9b050ea328\nx19: ffffffc0131dbc08 x18: 0000000000001000\nx17: 0000000000000000 x16: ffffffd2d461c6e0\nx15: 0000000000000242 x14: 000000000000018f\nx13: 000000000000004d x12: 0000000000000000\nx11: 0000000000000001 x10: fffffffffffffff0\nx9 : ffffff9bb6e793a8 x8 : 0000000000000000\nx7 : 0000000000000000 x6 : 000000000000003f\nx5 : 0000000000000040 x4 : fffffffffffffff0\nx3 : 0000000000000020 x2 : ffffff9bb6e79080\nx1 : 0000000000000010 x0 : ffffffc0131dbc08\nCall trace:\nvpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec (HASH:6c3f 2)]\nscp_ipi_handler+0xd0/0x194 [mtk_scp (HASH:7046 3)]\nmt8183_scp_irq_handler+0x44/0x88 [mtk_scp (HASH:7046 3)]\nscp_irq_handler+0x48/0x90 [mtk_scp (HASH:7046 3)]\nirq_thread_fn+0x38/0x94\nirq_thread+0x100/0x1c0\nkthread+0x140/0x1fc\nret_from_fork+0x10/0x30\nCode: 54000088 f94ca50a eb14015f 54000060 (f9400108)\n---[ end trace ace43ce36cbd5c93 ]---\nKernel panic - not syncing: Oops: Fatal exception\nSMP: stopping secondary CPUs\nKernel Offset: 0x12c4000000 from 0xffffffc010000000\nPHYS_OFFSET: 0xffffffe580000000\nCPU features: 0x08240002,2188200c\nMemory Limit: none
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-35915
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35878
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-35875
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-35871
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35867
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-25
CVE-2024-35861
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-25
CVE-2024-35837
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35832
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-35830
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35829
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35825
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-35819
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35818
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-35817
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-25
CVE-2024-35811
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35806
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35803
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-35799
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-35796
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-35784
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-33847
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-27436
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-25
CVE-2024-27419
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-27415
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-27407
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-19
CVE-2024-27401
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-27399
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel, kernel:6.6 完成修复 2024-11-22 2026-01-19
CVE-2024-27398
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-25
CVE-2024-27396
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-23
CVE-2024-27078
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-23
CVE-2024-27077
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-23
CVE-2024-27075
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-25
CVE-2024-27074
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-23
CVE-2024-27057
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:5.10, kernel:4.19 完成修复 2024-11-22 2026-01-25
CVE-2024-27053
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-23
CVE-2024-27046
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-23
CVE-2024-27045
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-23
CVE-2024-27044
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2024-11-22 2026-01-23
CVE-2024-27030
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-27024
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26999
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26996
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26980
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26962
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26956
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26954
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26951
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26950
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26948
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26945
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26938
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26937
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26936
In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: validate request buffer size in smb2_allocate_rsp_buf()\n\nThe response buffer should be allocated in smb2_allocate_rsp_buf\nbefore validating request. But the fields in payload as well as smb2 header\nis used in smb2_allocate_rsp_buf(). This patch add simple buffer size\nvalidation to avoid potencial out-of-bounds in request buffer.
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26929
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26928
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26915
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26896
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26886
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26874
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26863
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26861
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26844
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26842
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26841
In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Update cpu_sibling_map when disabling nonboot CPUs\n\nUpdate cpu_sibling_map when disabling nonboot CPUs by defining & calling\nclear_cpu_sibling_map(), otherwise we get such errors on SMT systems:\n\njump label: negative count!\nWARNING: CPU: 6 PID: 45 at kernel/jump_label.c:263 __static_key_slow_dec_cpuslocked+0xec/0x100\nCPU: 6 PID: 45 Comm: cpuhp/6 Not tainted 6.8.0-rc5+ #1340\npc 90000000004c302c ra 90000000004c302c tp 90000001005bc000 sp 90000001005bfd20\na0 000000000000001b a1 900000000224c278 a2 90000001005bfb58 a3 900000000224c280\na4 900000000224c278 a5 90000001005bfb50 a6 0000000000000001 a7 0000000000000001\nt0 ce87a4763eb5234a t1 ce87a4763eb5234a t2 0000000000000000 t3 0000000000000000\nt4 0000000000000006 t5 0000000000000000 t6 0000000000000064 t7 0000000000001964\nt8 000000000009ebf6 u0 9000000001f2a068 s9 0000000000000000 s0 900000000246a2d8\ns1 ffffffffffffffff s2 ffffffffffffffff s3 90000000021518c0 s4 0000000000000040\ns5 9000000002151058 s6 9000000009828e40 s7 00000000000000b4 s8 0000000000000006\n ra: 90000000004c302c __static_key_slow_dec_cpuslocked+0xec/0x100\n ERA: 90000000004c302c __static_key_slow_dec_cpuslocked+0xec/0x100\n CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n PRMD: 00000004 (PPLV0 +PIE -PWE)\n EUEN: 00000000 (-FPE -SXE -ASXE -BTE)\n ECFG: 00071c1c (LIE=2-4,10-12 VS=7)\nESTAT: 000c0000 [BRK] (IS= ECode=12 EsubCode=0)\n PRID: 0014d000 (Loongson-64bit, Loongson-3A6000-HV)\nCPU: 6 PID: 45 Comm: cpuhp/6 Not tainted 6.8.0-rc5+ #1340\nStack : 0000000000000000 900000000203f258 900000000179afc8 90000001005bc000\n 90000001005bf980 0000000000000000 90000001005bf988 9000000001fe0be0\n 900000000224c280 900000000224c278 90000001005bf8c0 0000000000000001\n 0000000000000001 ce87a4763eb5234a 0000000007f38000 90000001003f8cc0\n 0000000000000000 0000000000000006 0000000000000000 4c206e6f73676e6f\n 6f4c203a656d616e 000000000009ec99 0000000007f38000 0000000000000000\n 900000000214b000 9000000001fe0be0 0000000000000004 0000000000000000\n 0000000000000107 0000000000000009 ffffffffffafdabe 00000000000000b4\n 0000000000000006 90000000004c302c 9000000000224528 00005555939a0c7c\n 00000000000000b0 0000000000000004 0000000000000000 0000000000071c1c\n ...\nCall Trace:\n[<9000000000224528>] show_stack+0x48/0x1a0\n[<900000000179afc8>] dump_stack_lvl+0x78/0xa0\n[<9000000000263ed0>] __warn+0x90/0x1a0\n[<90000000017419b8>] report_bug+0x1b8/0x280\n[<900000000179c564>] do_bp+0x264/0x420\n[<90000000004c302c>] __static_key_slow_dec_cpuslocked+0xec/0x100\n[<90000000002b4d7c>] sched_cpu_deactivate+0x2fc/0x300\n[<9000000000266498>] cpuhp_invoke_callback+0x178/0x8a0\n[<9000000000267f70>] cpuhp_thread_fun+0xf0/0x240\n[<90000000002a117c>] smpboot_thread_fn+0x1dc/0x2e0\n[<900000000029a720>] kthread+0x140/0x160\n[<9000000000222288>] ret_from_kernel_thread+0xc/0xa4
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26839
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26833
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26830
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26825
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26803
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26797
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26795
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26789
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-23
CVE-2024-26787
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-22
CVE-2024-26784
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26775
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26774
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26770
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-22
CVE-2024-26768
In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]\n\nWith default config, the value of NR_CPUS is 64. When HW platform has\nmore then 64 cpus, system will crash on these platforms. MAX_CORE_PIC\nis the maximum cpu number in MADT table (max physical number) which can\nexceed the supported maximum cpu number (NR_CPUS, max logical number),\nbut kernel should not crash. Kernel should boot cpus with NR_CPUS, let\nthe remainder cpus stay in BIOS.\n\nThe potential crash reason is that the array acpi_core_pic[NR_CPUS] can\nbe overflowed when parsing MADT table, and it is obvious that CORE_PIC\nshould be corresponding to physical core rather than logical core, so it\nis better to define the array as acpi_core_pic[MAX_CORE_PIC].\n\nWith the patch, system can boot up 64 vcpus with qemu parameter -smp 128,\notherwise system will crash with the following message.\n\n[ 0.000000] CPU 0 Unable to handle kernel paging request at virtual address 0000420000004259, era == 90000000037a5f0c, ra == 90000000037a46ec\n[ 0.000000] Oops[#1]:\n[ 0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.8.0-rc2+ #192\n[ 0.000000] Hardware name: QEMU QEMU Virtual Machine, BIOS unknown 2/2/2022\n[ 0.000000] pc 90000000037a5f0c ra 90000000037a46ec tp 9000000003c90000 sp 9000000003c93d60\n[ 0.000000] a0 0000000000000019 a1 9000000003d93bc0 a2 0000000000000000 a3 9000000003c93bd8\n[ 0.000000] a4 9000000003c93a74 a5 9000000083c93a67 a6 9000000003c938f0 a7 0000000000000005\n[ 0.000000] t0 0000420000004201 t1 0000000000000000 t2 0000000000000001 t3 0000000000000001\n[ 0.000000] t4 0000000000000003 t5 0000000000000000 t6 0000000000000030 t7 0000000000000063\n[ 0.000000] t8 0000000000000014 u0 ffffffffffffffff s9 0000000000000000 s0 9000000003caee98\n[ 0.000000] s1 90000000041b0480 s2 9000000003c93da0 s3 9000000003c93d98 s4 9000000003c93d90\n[ 0.000000] s5 9000000003caa000 s6 000000000a7fd000 s7 000000000f556b60 s8 000000000e0a4330\n[ 0.000000] ra: 90000000037a46ec platform_init+0x214/0x250\n[ 0.000000] ERA: 90000000037a5f0c efi_runtime_init+0x30/0x94\n[ 0.000000] CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n[ 0.000000] PRMD: 00000000 (PPLV0 -PIE -PWE)\n[ 0.000000] EUEN: 00000000 (-FPE -SXE -ASXE -BTE)\n[ 0.000000] ECFG: 00070800 (LIE=11 VS=7)\n[ 0.000000] ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)\n[ 0.000000] BADV: 0000420000004259\n[ 0.000000] PRID: 0014c010 (Loongson-64bit, Loongson-3A5000)\n[ 0.000000] Modules linked in:\n[ 0.000000] Process swapper (pid: 0, threadinfo=(____ptrval____), task=(____ptrval____))\n[ 0.000000] Stack : 9000000003c93a14 9000000003800898 90000000041844f8 90000000037a46ec\n[ 0.000000] 000000000a7fd000 0000000008290000 0000000000000000 0000000000000000\n[ 0.000000] 0000000000000000 0000000000000000 00000000019d8000 000000000f556b60\n[ 0.000000] 000000000a7fd000 000000000f556b08 9000000003ca7700 9000000003800000\n[ 0.000000] 9000000003c93e50 9000000003800898 9000000003800108 90000000037a484c\n[ 0.000000] 000000000e0a4330 000000000f556b60 000000000a7fd000 000000000f556b08\n[ 0.000000] 9000000003ca7700 9000000004184000 0000000000200000 000000000e02b018\n[ 0.000000] 000000000a7fd000 90000000037a0790 9000000003800108 0000000000000000\n[ 0.000000] 0000000000000000 000000000e0a4330 000000000f556b60 000000000a7fd000\n[ 0.000000] 000000000f556b08 000000000eaae298 000000000eaa5040 0000000000200000\n[ 0.000000] ...\n[ 0.000000] Call Trace:\n[ 0.000000] [<90000000037a5f0c>] efi_runtime_init+0x30/0x94\n[ 0.000000] [<90000000037a46ec>] platform_init+0x214/0x250\n[ 0.000000] [<90000000037a484c>] setup_arch+0x124/0x45c\n[ 0.000000] [<90000000037a0790>] start_kernel+0x90/0x670\n[ 0.000000] [<900000000378b0d8>] kernel_entry+0xd8/0xdc
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26767
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26765
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26754
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-22
CVE-2024-26751
In the Linux kernel, the following vulnerability has been resolved:
Low kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-25
CVE-2024-26726
In the Linux kernel, the following vulnerability has been resolved:
Moderate kernel:4.19, kernel:5.10 完成修复 2024-11-22 2026-01-22

第1页 | 上一页| 下一页 | 最后一页

©龙芯开源社区 all right reserved,powered by Gitbook文档更新时间: 2026-03-16 12:14:50

results matching ""

    No results matching ""

    results matching ""

      No results matching ""