Количество 18
Количество 18

CVE-2023-52595
In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset When a hardware reset is triggered, all registers are reset, so all queues are forced to stop in hardware interface. However, mac80211 will not automatically stop the queue. If we don't manually stop the beacon queue, the queue will be deadlocked and unable to start again. This patch fixes the issue where Apple devices cannot connect to the AP after calling ieee80211_restart_hw().

CVE-2023-52595
In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset When a hardware reset is triggered, all registers are reset, so all queues are forced to stop in hardware interface. However, mac80211 will not automatically stop the queue. If we don't manually stop the beacon queue, the queue will be deadlocked and unable to start again. This patch fixes the issue where Apple devices cannot connect to the AP after calling ieee80211_restart_hw().

CVE-2023-52595
In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset When a hardware reset is triggered, all registers are reset, so all queues are forced to stop in hardware interface. However, mac80211 will not automatically stop the queue. If we don't manually stop the beacon queue, the queue will be deadlocked and unable to start again. This patch fixes the issue where Apple devices cannot connect to the AP after calling ieee80211_restart_hw().
CVE-2023-52595
In the Linux kernel, the following vulnerability has been resolved: w ...
GHSA-79hf-9rwh-4gv8
In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset When a hardware reset is triggered, all registers are reset, so all queues are forced to stop in hardware interface. However, mac80211 will not automatically stop the queue. If we don't manually stop the beacon queue, the queue will be deadlocked and unable to start again. This patch fixes the issue where Apple devices cannot connect to the AP after calling ieee80211_restart_hw().

BDU:2025-03818
Уязвимость функции rt2x00lib_disable_radio() модуля drivers/net/wireless/ralink/rt2x00/rt2x00dev.c - драйвера поддержки адаптеров беспроводной связи Ralink ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

ROS-20241004-05
Множественные уязвимости kernel-lt

RLSA-2024:3618
Moderate: kernel update
ELSA-2024-3618
ELSA-2024-3618: kernel update (MODERATE)

SUSE-SU-2024:1466-1
Security update for the Linux Kernel

SUSE-SU-2024:1322-1
Security update for the Linux Kernel

SUSE-SU-2024:1480-1
Security update for the Linux Kernel

SUSE-SU-2024:1490-1
Security update for the Linux Kernel

SUSE-SU-2024:1646-1
Security update for the Linux Kernel

SUSE-SU-2024:1870-1
Security update for the Linux Kernel

SUSE-SU-2024:1648-1
Security update for the Linux Kernel

SUSE-SU-2024:1643-1
Security update for the Linux Kernel
ELSA-2024-9315
ELSA-2024-9315: kernel security update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-52595 In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset When a hardware reset is triggered, all registers are reset, so all queues are forced to stop in hardware interface. However, mac80211 will not automatically stop the queue. If we don't manually stop the beacon queue, the queue will be deadlocked and unable to start again. This patch fixes the issue where Apple devices cannot connect to the AP after calling ieee80211_restart_hw(). | CVSS3: 5.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-52595 In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset When a hardware reset is triggered, all registers are reset, so all queues are forced to stop in hardware interface. However, mac80211 will not automatically stop the queue. If we don't manually stop the beacon queue, the queue will be deadlocked and unable to start again. This patch fixes the issue where Apple devices cannot connect to the AP after calling ieee80211_restart_hw(). | CVSS3: 4.4 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-52595 In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset When a hardware reset is triggered, all registers are reset, so all queues are forced to stop in hardware interface. However, mac80211 will not automatically stop the queue. If we don't manually stop the beacon queue, the queue will be deadlocked and unable to start again. This patch fixes the issue where Apple devices cannot connect to the AP after calling ieee80211_restart_hw(). | CVSS3: 5.5 | 0% Низкий | больше 1 года назад |
CVE-2023-52595 In the Linux kernel, the following vulnerability has been resolved: w ... | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
GHSA-79hf-9rwh-4gv8 In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset When a hardware reset is triggered, all registers are reset, so all queues are forced to stop in hardware interface. However, mac80211 will not automatically stop the queue. If we don't manually stop the beacon queue, the queue will be deadlocked and unable to start again. This patch fixes the issue where Apple devices cannot connect to the AP after calling ieee80211_restart_hw(). | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
![]() | BDU:2025-03818 Уязвимость функции rt2x00lib_disable_radio() модуля drivers/net/wireless/ralink/rt2x00/rt2x00dev.c - драйвера поддержки адаптеров беспроводной связи Ralink ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | больше 1 года назад |
![]() | ROS-20241004-05 Множественные уязвимости kernel-lt | CVSS3: 8.8 | 9 месяцев назад | |
![]() | RLSA-2024:3618 Moderate: kernel update | около 1 года назад | ||
ELSA-2024-3618 ELSA-2024-3618: kernel update (MODERATE) | около 1 года назад | |||
![]() | SUSE-SU-2024:1466-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:1322-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:1480-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:1490-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:1646-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:1870-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:1648-1 Security update for the Linux Kernel | около 1 года назад | ||
![]() | SUSE-SU-2024:1643-1 Security update for the Linux Kernel | около 1 года назад | ||
ELSA-2024-9315 ELSA-2024-9315: kernel security update (MODERATE) | 7 месяцев назад |
Уязвимостей на страницу