| Summary | In the Linux kernel, the following vulnerability has been resolved: PCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup() Avoid large backtrace, it is sufficient to warn the user that there has This makes an actual link issue less verbose. First of all, this controller has a limitation in that the controller In case of an ASMedia ASM1062 PCIe SATA controller which does not support Once rcar_pcie_wakeup() is called, if the link is already back in L0 state Reduce this warning verbosity. In case the link is really broken, the |
|---|---|
| Publication Date | Aug. 21, 2024, 10:15 a.m. |
| Registration Date | Aug. 26, 2024, 4:59 p.m. |
| Last Update | Aug. 21, 2024, 9:30 p.m. |
| Title | Linux の Linux Kernel における脆弱性 |
|---|---|
| Summary | Linux の Linux Kernel には、不特定の脆弱性が存在します。 |
| Possible impacts | サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | May 28, 2024, midnight |
| Registration Date | Oct. 23, 2025, 2:24 p.m. |
| Last Update | Oct. 23, 2025, 2:24 p.m. |
| Linux |
| Linux Kernel 5.18 以上 6.1.103 未満 |
| Linux Kernel 6.2 以上 6.6.44 未満 |
| Linux Kernel 6.7 以上 6.10.3 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2025年10月23日] 掲載 |
Oct. 23, 2025, 2:22 p.m. |