Количество 25
Количество 25
CVE-2024-57849
In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_context() +--> event_sched_out() +--> cpumsf_pmu_del(...
CVE-2024-57849
In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_context() +--> event_sched_out() +--> cpumsf_pmu_del(...
CVE-2024-57849
In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_co
CVE-2024-57849
In the Linux kernel, the following vulnerability has been resolved: s ...
GHSA-q4cg-m7j8-ggr6
In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from...
BDU:2025-06153
Уязвимость компонентов s390/cpum_sf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2026:0269-1
Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:0154-1
Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5)
SUSE-SU-2026:0246-1
Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0173-1
Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0174-1
Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0166-1
Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2025:0771-1
Security update for the Linux Kernel
SUSE-SU-2025:0517-1
Security update for the Linux Kernel
SUSE-SU-2025:0576-1
Security update for the Linux Kernel
ROS-20250520-01
Множественные уязвимости kernel-lt
SUSE-SU-2025:0236-1
Security update for the Linux Kernel
SUSE-SU-2025:0577-2
Security update for the Linux Kernel
SUSE-SU-2025:0577-1
Security update for the Linux Kernel
SUSE-SU-2025:0428-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-57849 In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_context() +--> event_sched_out() +--> cpumsf_pmu_del(... | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
CVE-2024-57849 In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_context() +--> event_sched_out() +--> cpumsf_pmu_del(... | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-57849 In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_co | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
CVE-2024-57849 In the Linux kernel, the following vulnerability has been resolved: s ... | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
GHSA-q4cg-m7j8-ggr6 In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from... | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
BDU:2025-06153 Уязвимость компонентов s390/cpum_sf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
SUSE-SU-2026:0269-1 Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6) | 12 дней назад | |||
SUSE-SU-2026:0154-1 Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5) | 16 дней назад | |||
SUSE-SU-2026:0246-1 Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5) | 13 дней назад | |||
SUSE-SU-2026:0173-1 Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP5) | 16 дней назад | |||
SUSE-SU-2026:0174-1 Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4) | 16 дней назад | |||
SUSE-SU-2026:0166-1 Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4) | 16 дней назад | |||
SUSE-SU-2025:0771-1 Security update for the Linux Kernel | 11 месяцев назад | |||
SUSE-SU-2025:0517-1 Security update for the Linux Kernel | 12 месяцев назад | |||
SUSE-SU-2025:0576-1 Security update for the Linux Kernel | 12 месяцев назад | |||
ROS-20250520-01 Множественные уязвимости kernel-lt | CVSS3: 8.8 | 9 месяцев назад | ||
SUSE-SU-2025:0236-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2025:0577-2 Security update for the Linux Kernel | 11 месяцев назад | |||
SUSE-SU-2025:0577-1 Security update for the Linux Kernel | 11 месяцев назад | |||
SUSE-SU-2025:0428-1 Security update for the Linux Kernel | 12 месяцев назад |
Уязвимостей на страницу