Количество 12
Количество 12

CVE-2025-37804
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

CVE-2025-37804
[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: io_uring: always do atomic put from iowq

CVE-2025-37804
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

CVE-2025-37804
GHSA-wp83-78c2-q7f9
In the Linux kernel, the following vulnerability has been resolved: io_uring: always do atomic put from iowq io_uring always switches requests to atomic refcounting for iowq execution before there is any parallilism by setting REQ_F_REFCOUNT, and the flag is not cleared until the request completes. That should be fine as long as the compiler doesn't make up a non existing value for the flags, however KCSAN still complains when the request owner changes oter flag bits: BUG: KCSAN: data-race in io_req_task_cancel / io_wq_free_work ... read to 0xffff888117207448 of 8 bytes by task 3871 on cpu 0: req_ref_put_and_test io_uring/refs.h:22 [inline] Skip REQ_F_REFCOUNT checks for iowq, we know it's set.

SUSE-SU-2025:01972-1
Security update for the Linux Kernel

SUSE-SU-2025:02000-1
Security update for the Linux Kernel

SUSE-SU-2025:01965-1
Security update for the Linux Kernel

SUSE-SU-2025:01951-1
Security update for the Linux Kernel

SUSE-SU-2025:01967-1
Security update for the Linux Kernel

SUSE-SU-2025:01964-1
Security update for the Linux Kernel

SUSE-SU-2025:01919-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2025-37804 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 4 месяца назад | ||
![]() | CVE-2025-37804 [REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: io_uring: always do atomic put from iowq | CVSS3: 5.5 | 4 месяца назад | |
![]() | CVE-2025-37804 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 4 месяца назад | ||
![]() | около 1 месяца назад | |||
GHSA-wp83-78c2-q7f9 In the Linux kernel, the following vulnerability has been resolved: io_uring: always do atomic put from iowq io_uring always switches requests to atomic refcounting for iowq execution before there is any parallilism by setting REQ_F_REFCOUNT, and the flag is not cleared until the request completes. That should be fine as long as the compiler doesn't make up a non existing value for the flags, however KCSAN still complains when the request owner changes oter flag bits: BUG: KCSAN: data-race in io_req_task_cancel / io_wq_free_work ... read to 0xffff888117207448 of 8 bytes by task 3871 on cpu 0: req_ref_put_and_test io_uring/refs.h:22 [inline] Skip REQ_F_REFCOUNT checks for iowq, we know it's set. | 4 месяца назад | |||
![]() | SUSE-SU-2025:01972-1 Security update for the Linux Kernel | 2 месяца назад | ||
![]() | SUSE-SU-2025:02000-1 Security update for the Linux Kernel | 2 месяца назад | ||
![]() | SUSE-SU-2025:01965-1 Security update for the Linux Kernel | 2 месяца назад | ||
![]() | SUSE-SU-2025:01951-1 Security update for the Linux Kernel | 2 месяца назад | ||
![]() | SUSE-SU-2025:01967-1 Security update for the Linux Kernel | 2 месяца назад | ||
![]() | SUSE-SU-2025:01964-1 Security update for the Linux Kernel | 2 месяца назад | ||
![]() | SUSE-SU-2025:01919-1 Security update for the Linux Kernel | 2 месяца назад |
Уязвимостей на страницу