Количество 9
Количество 9
CVE-2023-52681
In the Linux kernel, the following vulnerability has been resolved: efivarfs: Free s_fs_info on unmount Now that we allocate a s_fs_info struct on fs context creation, we should ensure that we free it again when the superblock goes away.
CVE-2023-52681
In the Linux kernel, the following vulnerability has been resolved: efivarfs: Free s_fs_info on unmount Now that we allocate a s_fs_info struct on fs context creation, we should ensure that we free it again when the superblock goes away.
CVE-2023-52681
In the Linux kernel, the following vulnerability has been resolved: efivarfs: Free s_fs_info on unmount Now that we allocate a s_fs_info struct on fs context creation, we should ensure that we free it again when the superblock goes away.
CVE-2023-52681
In the Linux kernel, the following vulnerability has been resolved: e ...
GHSA-pvp3-22v7-6xcv
In the Linux kernel, the following vulnerability has been resolved: efivarfs: Free s_fs_info on unmount Now that we allocate a s_fs_info struct on fs context creation, we should ensure that we free it again when the superblock goes away.
BDU:2025-14301
Уязвимость функции efivarfs_init_fs_context() модуля fs/efivarfs/super.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2024:2203-1
Security update for the Linux Kernel
SUSE-SU-2024:2135-1
Security update for the Linux Kernel
SUSE-SU-2024:2973-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-52681 In the Linux kernel, the following vulnerability has been resolved: efivarfs: Free s_fs_info on unmount Now that we allocate a s_fs_info struct on fs context creation, we should ensure that we free it again when the superblock goes away. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
CVE-2023-52681 In the Linux kernel, the following vulnerability has been resolved: efivarfs: Free s_fs_info on unmount Now that we allocate a s_fs_info struct on fs context creation, we should ensure that we free it again when the superblock goes away. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
CVE-2023-52681 In the Linux kernel, the following vulnerability has been resolved: efivarfs: Free s_fs_info on unmount Now that we allocate a s_fs_info struct on fs context creation, we should ensure that we free it again when the superblock goes away. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
CVE-2023-52681 In the Linux kernel, the following vulnerability has been resolved: e ... | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
GHSA-pvp3-22v7-6xcv In the Linux kernel, the following vulnerability has been resolved: efivarfs: Free s_fs_info on unmount Now that we allocate a s_fs_info struct on fs context creation, we should ensure that we free it again when the superblock goes away. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
BDU:2025-14301 Уязвимость функции efivarfs_init_fs_context() модуля fs/efivarfs/super.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
SUSE-SU-2024:2203-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:2135-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:2973-1 Security update for the Linux Kernel | больше 1 года назад |
Уязвимостей на страницу