| CVE-2024-35996 |
In the Linux kernel, the following vulnerability has been resolved:\n\ncpu: Re-enable CPU mitigations by default for !X86 architectures\n\nRename x86's to CPU_MITIGATIONS, define it in generic code, and force it\non for all architectures exception x86. A recent commit to turn\nmitigations off by default if SPECULATION_MITIGATIONS=n kinda sorta\nmissed that "cpu_mitigations" is completely generic, whereas\nSPECULATION_MITIGATIONS is x86-specific.\n\nRename x86's SPECULATIVE_MITIGATIONS instead of keeping both and have it\nselect CPU_MITIGATIONS, as having two configs for the same thing is\nunnecessary and confusing. This will also allow x86 to use the knob to\nmanage mitigations that aren't strictly related to speculative\nexecution.\n\nUse another Kconfig to communicate to common code that CPU_MITIGATIONS\nis already defined instead of having x86's menu depend on the common\nCPU_MITIGATIONS. This allows keeping a single point of contact for all\nof x86's mitigations, and it's not clear that other architectures *want*\nto allow disabling mitigations at compile-time. |
Moderate |
kernel:5.10, kernel:4.19 |
是 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35995 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-35988 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35982 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35978 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35971 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35967 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35965 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35957 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35949 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35948 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35942 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-35933 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35932 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35929 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35926 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-35920 |
In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mediatek: vcodec: adding lock to protect decoder context list\n\nAdd a lock for the ctx_list, to avoid accessing a NULL pointer\nwithin the 'vpu_dec_ipi_handler' function when the ctx_list has\nbeen deleted due to an unexpected behavior on the SCP IP block.\n\nHardware name: Google juniper sku16 board (DT)\npstate: 20400005 (nzCv daif +PAN -UAO -TCO BTYPE=--)\npc : vpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec]\nlr : scp_ipi_handler+0xd0/0x194 [mtk_scp]\nsp : ffffffc0131dbbd0\nx29: ffffffc0131dbbd0 x28: 0000000000000000\nx27: ffffff9bb277f348 x26: ffffff9bb242ad00\nx25: ffffffd2d440d3b8 x24: ffffffd2a13ff1d4\nx23: ffffff9bb7fe85a0 x22: ffffffc0133fbdb0\nx21: 0000000000000010 x20: ffffff9b050ea328\nx19: ffffffc0131dbc08 x18: 0000000000001000\nx17: 0000000000000000 x16: ffffffd2d461c6e0\nx15: 0000000000000242 x14: 000000000000018f\nx13: 000000000000004d x12: 0000000000000000\nx11: 0000000000000001 x10: fffffffffffffff0\nx9 : ffffff9bb6e793a8 x8 : 0000000000000000\nx7 : 0000000000000000 x6 : 000000000000003f\nx5 : 0000000000000040 x4 : fffffffffffffff0\nx3 : 0000000000000020 x2 : ffffff9bb6e79080\nx1 : 0000000000000010 x0 : ffffffc0131dbc08\nCall trace:\nvpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec (HASH:6c3f 2)]\nscp_ipi_handler+0xd0/0x194 [mtk_scp (HASH:7046 3)]\nmt8183_scp_irq_handler+0x44/0x88 [mtk_scp (HASH:7046 3)]\nscp_irq_handler+0x48/0x90 [mtk_scp (HASH:7046 3)]\nirq_thread_fn+0x38/0x94\nirq_thread+0x100/0x1c0\nkthread+0x140/0x1fc\nret_from_fork+0x10/0x30\nCode: 54000088 f94ca50a eb14015f 54000060 (f9400108)\n---[ end trace ace43ce36cbd5c93 ]---\nKernel panic - not syncing: Oops: Fatal exception\nSMP: stopping secondary CPUs\nKernel Offset: 0x12c4000000 from 0xffffffc010000000\nPHYS_OFFSET: 0xffffffe580000000\nCPU features: 0x08240002,2188200c\nMemory Limit: none |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35915 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35878 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35875 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35871 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35867 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-35861 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-35837 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35832 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35830 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35829 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35825 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35819 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35818 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35817 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-35811 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35806 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35803 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35799 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35796 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-35784 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-33847 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-27436 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-27419 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-27415 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-27407 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-27401 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-27399 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-19 |
| CVE-2024-27398 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-27396 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-27078 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-27077 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-27075 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-27074 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-27057 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:5.10, kernel:4.19 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-27053 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-27046 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-27045 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-27044 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-27030 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-27024 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26999 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26996 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26980 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26962 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26956 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26954 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26951 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26950 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26948 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26945 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26938 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26937 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26936 |
In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: validate request buffer size in smb2_allocate_rsp_buf()\n\nThe response buffer should be allocated in smb2_allocate_rsp_buf\nbefore validating request. But the fields in payload as well as smb2 header\nis used in smb2_allocate_rsp_buf(). This patch add simple buffer size\nvalidation to avoid potencial out-of-bounds in request buffer. |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26929 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26928 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26915 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26896 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26886 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26874 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26863 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26861 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26844 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26842 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26841 |
In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Update cpu_sibling_map when disabling nonboot CPUs\n\nUpdate cpu_sibling_map when disabling nonboot CPUs by defining & calling\nclear_cpu_sibling_map(), otherwise we get such errors on SMT systems:\n\njump label: negative count!\nWARNING: CPU: 6 PID: 45 at kernel/jump_label.c:263 __static_key_slow_dec_cpuslocked+0xec/0x100\nCPU: 6 PID: 45 Comm: cpuhp/6 Not tainted 6.8.0-rc5+ #1340\npc 90000000004c302c ra 90000000004c302c tp 90000001005bc000 sp 90000001005bfd20\na0 000000000000001b a1 900000000224c278 a2 90000001005bfb58 a3 900000000224c280\na4 900000000224c278 a5 90000001005bfb50 a6 0000000000000001 a7 0000000000000001\nt0 ce87a4763eb5234a t1 ce87a4763eb5234a t2 0000000000000000 t3 0000000000000000\nt4 0000000000000006 t5 0000000000000000 t6 0000000000000064 t7 0000000000001964\nt8 000000000009ebf6 u0 9000000001f2a068 s9 0000000000000000 s0 900000000246a2d8\ns1 ffffffffffffffff s2 ffffffffffffffff s3 90000000021518c0 s4 0000000000000040\ns5 9000000002151058 s6 9000000009828e40 s7 00000000000000b4 s8 0000000000000006\n ra: 90000000004c302c __static_key_slow_dec_cpuslocked+0xec/0x100\n ERA: 90000000004c302c __static_key_slow_dec_cpuslocked+0xec/0x100\n CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n PRMD: 00000004 (PPLV0 +PIE -PWE)\n EUEN: 00000000 (-FPE -SXE -ASXE -BTE)\n ECFG: 00071c1c (LIE=2-4,10-12 VS=7)\nESTAT: 000c0000 [BRK] (IS= ECode=12 EsubCode=0)\n PRID: 0014d000 (Loongson-64bit, Loongson-3A6000-HV)\nCPU: 6 PID: 45 Comm: cpuhp/6 Not tainted 6.8.0-rc5+ #1340\nStack : 0000000000000000 900000000203f258 900000000179afc8 90000001005bc000\n 90000001005bf980 0000000000000000 90000001005bf988 9000000001fe0be0\n 900000000224c280 900000000224c278 90000001005bf8c0 0000000000000001\n 0000000000000001 ce87a4763eb5234a 0000000007f38000 90000001003f8cc0\n 0000000000000000 0000000000000006 0000000000000000 4c206e6f73676e6f\n 6f4c203a656d616e 000000000009ec99 0000000007f38000 0000000000000000\n 900000000214b000 9000000001fe0be0 0000000000000004 0000000000000000\n 0000000000000107 0000000000000009 ffffffffffafdabe 00000000000000b4\n 0000000000000006 90000000004c302c 9000000000224528 00005555939a0c7c\n 00000000000000b0 0000000000000004 0000000000000000 0000000000071c1c\n ...\nCall Trace:\n[<9000000000224528>] show_stack+0x48/0x1a0\n[<900000000179afc8>] dump_stack_lvl+0x78/0xa0\n[<9000000000263ed0>] __warn+0x90/0x1a0\n[<90000000017419b8>] report_bug+0x1b8/0x280\n[<900000000179c564>] do_bp+0x264/0x420\n[<90000000004c302c>] __static_key_slow_dec_cpuslocked+0xec/0x100\n[<90000000002b4d7c>] sched_cpu_deactivate+0x2fc/0x300\n[<9000000000266498>] cpuhp_invoke_callback+0x178/0x8a0\n[<9000000000267f70>] cpuhp_thread_fun+0xf0/0x240\n[<90000000002a117c>] smpboot_thread_fn+0x1dc/0x2e0\n[<900000000029a720>] kthread+0x140/0x160\n[<9000000000222288>] ret_from_kernel_thread+0xc/0xa4 |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26839 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26833 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26830 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26825 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26803 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26797 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26795 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26789 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-23 |
| CVE-2024-26787 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2024-26784 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26775 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26774 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26770 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2024-26768 |
In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]\n\nWith default config, the value of NR_CPUS is 64. When HW platform has\nmore then 64 cpus, system will crash on these platforms. MAX_CORE_PIC\nis the maximum cpu number in MADT table (max physical number) which can\nexceed the supported maximum cpu number (NR_CPUS, max logical number),\nbut kernel should not crash. Kernel should boot cpus with NR_CPUS, let\nthe remainder cpus stay in BIOS.\n\nThe potential crash reason is that the array acpi_core_pic[NR_CPUS] can\nbe overflowed when parsing MADT table, and it is obvious that CORE_PIC\nshould be corresponding to physical core rather than logical core, so it\nis better to define the array as acpi_core_pic[MAX_CORE_PIC].\n\nWith the patch, system can boot up 64 vcpus with qemu parameter -smp 128,\notherwise system will crash with the following message.\n\n[ 0.000000] CPU 0 Unable to handle kernel paging request at virtual address 0000420000004259, era == 90000000037a5f0c, ra == 90000000037a46ec\n[ 0.000000] Oops[#1]:\n[ 0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.8.0-rc2+ #192\n[ 0.000000] Hardware name: QEMU QEMU Virtual Machine, BIOS unknown 2/2/2022\n[ 0.000000] pc 90000000037a5f0c ra 90000000037a46ec tp 9000000003c90000 sp 9000000003c93d60\n[ 0.000000] a0 0000000000000019 a1 9000000003d93bc0 a2 0000000000000000 a3 9000000003c93bd8\n[ 0.000000] a4 9000000003c93a74 a5 9000000083c93a67 a6 9000000003c938f0 a7 0000000000000005\n[ 0.000000] t0 0000420000004201 t1 0000000000000000 t2 0000000000000001 t3 0000000000000001\n[ 0.000000] t4 0000000000000003 t5 0000000000000000 t6 0000000000000030 t7 0000000000000063\n[ 0.000000] t8 0000000000000014 u0 ffffffffffffffff s9 0000000000000000 s0 9000000003caee98\n[ 0.000000] s1 90000000041b0480 s2 9000000003c93da0 s3 9000000003c93d98 s4 9000000003c93d90\n[ 0.000000] s5 9000000003caa000 s6 000000000a7fd000 s7 000000000f556b60 s8 000000000e0a4330\n[ 0.000000] ra: 90000000037a46ec platform_init+0x214/0x250\n[ 0.000000] ERA: 90000000037a5f0c efi_runtime_init+0x30/0x94\n[ 0.000000] CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n[ 0.000000] PRMD: 00000000 (PPLV0 -PIE -PWE)\n[ 0.000000] EUEN: 00000000 (-FPE -SXE -ASXE -BTE)\n[ 0.000000] ECFG: 00070800 (LIE=11 VS=7)\n[ 0.000000] ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)\n[ 0.000000] BADV: 0000420000004259\n[ 0.000000] PRID: 0014c010 (Loongson-64bit, Loongson-3A5000)\n[ 0.000000] Modules linked in:\n[ 0.000000] Process swapper (pid: 0, threadinfo=(____ptrval____), task=(____ptrval____))\n[ 0.000000] Stack : 9000000003c93a14 9000000003800898 90000000041844f8 90000000037a46ec\n[ 0.000000] 000000000a7fd000 0000000008290000 0000000000000000 0000000000000000\n[ 0.000000] 0000000000000000 0000000000000000 00000000019d8000 000000000f556b60\n[ 0.000000] 000000000a7fd000 000000000f556b08 9000000003ca7700 9000000003800000\n[ 0.000000] 9000000003c93e50 9000000003800898 9000000003800108 90000000037a484c\n[ 0.000000] 000000000e0a4330 000000000f556b60 000000000a7fd000 000000000f556b08\n[ 0.000000] 9000000003ca7700 9000000004184000 0000000000200000 000000000e02b018\n[ 0.000000] 000000000a7fd000 90000000037a0790 9000000003800108 0000000000000000\n[ 0.000000] 0000000000000000 000000000e0a4330 000000000f556b60 000000000a7fd000\n[ 0.000000] 000000000f556b08 000000000eaae298 000000000eaa5040 0000000000200000\n[ 0.000000] ...\n[ 0.000000] Call Trace:\n[ 0.000000] [<90000000037a5f0c>] efi_runtime_init+0x30/0x94\n[ 0.000000] [<90000000037a46ec>] platform_init+0x214/0x250\n[ 0.000000] [<90000000037a484c>] setup_arch+0x124/0x45c\n[ 0.000000] [<90000000037a0790>] start_kernel+0x90/0x670\n[ 0.000000] [<900000000378b0d8>] kernel_entry+0xd8/0xdc |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26767 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26765 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26754 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2024-26751 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26726 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |