Количество 13
Количество 13
GHSA-wp83-78c2-q7f9
In the Linux kernel, the following vulnerability has been resolved: io_uring: always do atomic put from iowq io_uring always switches requests to atomic refcounting for iowq execution before there is any parallilism by setting REQ_F_REFCOUNT, and the flag is not cleared until the request completes. That should be fine as long as the compiler doesn't make up a non existing value for the flags, however KCSAN still complains when the request owner changes oter flag bits: BUG: KCSAN: data-race in io_req_task_cancel / io_wq_free_work ... read to 0xffff888117207448 of 8 bytes by task 3871 on cpu 0: req_ref_put_and_test io_uring/refs.h:22 [inline] Skip REQ_F_REFCOUNT checks for iowq, we know it's set.
CVE-2025-37804
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-37804
[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: io_uring: always do atomic put from iowq
CVE-2025-37804
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-37804
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
BDU:2025-10367
Уязвимость функции io_wq_free_work ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2025:01972-1
Security update for the Linux Kernel
SUSE-SU-2025:02000-1
Security update for the Linux Kernel
SUSE-SU-2025:01965-1
Security update for the Linux Kernel
SUSE-SU-2025:01951-1
Security update for the Linux Kernel
SUSE-SU-2025:01967-1
Security update for the Linux Kernel
SUSE-SU-2025:01964-1
Security update for the Linux Kernel
SUSE-SU-2025:01919-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-wp83-78c2-q7f9 In the Linux kernel, the following vulnerability has been resolved: io_uring: always do atomic put from iowq io_uring always switches requests to atomic refcounting for iowq execution before there is any parallilism by setting REQ_F_REFCOUNT, and the flag is not cleared until the request completes. That should be fine as long as the compiler doesn't make up a non existing value for the flags, however KCSAN still complains when the request owner changes oter flag bits: BUG: KCSAN: data-race in io_req_task_cancel / io_wq_free_work ... read to 0xffff888117207448 of 8 bytes by task 3871 on cpu 0: req_ref_put_and_test io_uring/refs.h:22 [inline] Skip REQ_F_REFCOUNT checks for iowq, we know it's set. | 6 месяцев назад | |||
CVE-2025-37804 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 6 месяцев назад | |||
CVE-2025-37804 [REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: io_uring: always do atomic put from iowq | 6 месяцев назад | |||
CVE-2025-37804 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 6 месяцев назад | |||
CVE-2025-37804 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | около 1 месяца назад | |||
BDU:2025-10367 Уязвимость функции io_wq_free_work ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 4.8 | 6 месяцев назад | ||
SUSE-SU-2025:01972-1 Security update for the Linux Kernel | 5 месяцев назад | |||
SUSE-SU-2025:02000-1 Security update for the Linux Kernel | 5 месяцев назад | |||
SUSE-SU-2025:01965-1 Security update for the Linux Kernel | 5 месяцев назад | |||
SUSE-SU-2025:01951-1 Security update for the Linux Kernel | 5 месяцев назад | |||
SUSE-SU-2025:01967-1 Security update for the Linux Kernel | 5 месяцев назад | |||
SUSE-SU-2025:01964-1 Security update for the Linux Kernel | 5 месяцев назад | |||
SUSE-SU-2025:01919-1 Security update for the Linux Kernel | 5 месяцев назад |
Уязвимостей на страницу