Количество 9
Количество 9
GHSA-f7jh-2qx8-6pwr
In the Linux kernel, the following vulnerability has been resolved: drm/tegra: Add call to put_pid() Add a call to put_pid() corresponding to get_task_pid(). host1x_memory_context_alloc() does not take ownership of the PID so we need to free it here to avoid leaking. [mperttunen@nvidia.com: reword commit message]
CVE-2025-68233
In the Linux kernel, the following vulnerability has been resolved: drm/tegra: Add call to put_pid() Add a call to put_pid() corresponding to get_task_pid(). host1x_memory_context_alloc() does not take ownership of the PID so we need to free it here to avoid leaking. [mperttunen@nvidia.com: reword commit message]
CVE-2025-68233
In the Linux kernel, the following vulnerability has been resolved: drm/tegra: Add call to put_pid() Add a call to put_pid() corresponding to get_task_pid(). host1x_memory_context_alloc() does not take ownership of the PID so we need to free it here to avoid leaking. [mperttunen@nvidia.com: reword commit message]
CVE-2025-68233
drm/tegra: Add call to put_pid()
CVE-2025-68233
In the Linux kernel, the following vulnerability has been resolved: d ...
SUSE-SU-2026:0293-1
Security update for the Linux Kernel
SUSE-SU-2026:0315-1
Security update for the Linux Kernel
SUSE-SU-2026:0281-1
Security update for the Linux Kernel
SUSE-SU-2026:0278-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-f7jh-2qx8-6pwr In the Linux kernel, the following vulnerability has been resolved: drm/tegra: Add call to put_pid() Add a call to put_pid() corresponding to get_task_pid(). host1x_memory_context_alloc() does not take ownership of the PID so we need to free it here to avoid leaking. [mperttunen@nvidia.com: reword commit message] | 0% Низкий | около 2 месяцев назад | ||
CVE-2025-68233 In the Linux kernel, the following vulnerability has been resolved: drm/tegra: Add call to put_pid() Add a call to put_pid() corresponding to get_task_pid(). host1x_memory_context_alloc() does not take ownership of the PID so we need to free it here to avoid leaking. [mperttunen@nvidia.com: reword commit message] | 0% Низкий | около 2 месяцев назад | ||
CVE-2025-68233 In the Linux kernel, the following vulnerability has been resolved: drm/tegra: Add call to put_pid() Add a call to put_pid() corresponding to get_task_pid(). host1x_memory_context_alloc() does not take ownership of the PID so we need to free it here to avoid leaking. [mperttunen@nvidia.com: reword commit message] | 0% Низкий | около 2 месяцев назад | ||
CVE-2025-68233 drm/tegra: Add call to put_pid() | CVSS3: 6.2 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-68233 In the Linux kernel, the following vulnerability has been resolved: d ... | 0% Низкий | около 2 месяцев назад | ||
SUSE-SU-2026:0293-1 Security update for the Linux Kernel | 10 дней назад | |||
SUSE-SU-2026:0315-1 Security update for the Linux Kernel | 8 дней назад | |||
SUSE-SU-2026:0281-1 Security update for the Linux Kernel | 13 дней назад | |||
SUSE-SU-2026:0278-1 Security update for the Linux Kernel | 13 дней назад |
Уязвимостей на страницу